Strategic Plan for Google
The following is an outline of the strategic plan for Google that provides insights into the organizational activities, competitiveness, and performance.
Executive summary of the business plan of Google
The mission statement of Google
Corporate Culture of Google
Historical Development, Performance, and Results of Google
Management and the Leadership Structure of Google
Situational Analysis of Google (SWOT) Analysis
Strengths of Google
Weaknesses of Google
Opportunities of the Company
Threats Facing the Performance and Competitiveness of Google
Market Research of Google
Competition and Competitiveness of Google
Clients or Customers Utilizing the Services Provided by Google
Other factors that affect the performance and the competitiveness of the company
Marketing Goals of Google
Market Share of Google
Diversification Strategies Adopted by Google
Channels of Distribution Used by the Company
6. Service Development Within Google
Description of Services offered by the Company
Pricing Strategies Adopted by the Company
Service Delivery Systems
Service Delivery Capability
Suppliers of the Important Elements that Influence the Performance of the Company
7. Marketing Plan of Google
Strategies and Tactics Used to Execute Organizational Marketing Strategies
Positioning of the Services Offered in the Marketplace
Relations with the Public
8. Risk Factors that Face Google
Shortfall in its Revenue
Global Economic Recession
Constantly Changing Global Policies on Consumer Protection and Organizational Legal requirements
Disaster Recovery Plan of Google
Objective of the Disaster Recovery Plan
The key objective of the disaster recovery plan of Google is to restore back the normal functioning of the affected system and recover lost information to ensure the normal running of organizational activities.
Disaster Recovery Plan
1. Seeking for approval from the top management of the company for the recovery process to begin as it ensures acquisition of the required resources for the process
2. Coming up with the planning committee to take the responsibility of developing the actual recovery plans for the organizational problem
3. Performing risk assessment on the affected systems to analyze the nature and extent of the damage to the organizational information storage system
4. Developing priorities-, this entails deciding on the organizational systems that should be resolved immediately to ensure the normal running of organizational activities. Prioritizing allows for the concentration of the organizational resources for managing the disaster.
5. Developing recovery systems- the stage entails determining the method for backing up the hardware, communications, software, operations, files, and services within the organization. The process determines the rate of the disaster recovery process.
6. Data identification- this entails protecting the data that should be protected from further loss during the event, thereby, safe recovery of the lost information after the disaster. Such includes inventory statistics of the company, insurance policies, and list of prospective vendors of the company (Fulmer, 2005).
7. Creating a written plan-, the written plan provides an outline of the data that should be accounted for and ways of recovering it.
8. Creating a backup plan for ensuring a successful recovery after the disaster and protection of organizational information
9. Test the developed recovery plan- testing ensures its success when used in responding to the present and future disasters likely to affect the normal functioning of the company.
10. Plan approval- the committee approves the plan after it proves effective in protecting further loss of organizational information and system inefficiency (de Guise, 2008).
The large volume of data increases its vulnerability to los, corruption, stolen, or compromised by access by third parties. Similarly, failures such a hardware, malware, hacking, and human error can also result in a significant loss of organizational data. Loss of organizational data costs organizations significantly. As such, integrating data backup and data recovery into the business continuity plan of the company is imperative. The development of the data backup plan for the company begins with the identification of the data to be backed up, selecting the software and hardware for use, and implementing the procedures required to see the success of the backup process. Developing data backup plan for Google entails the identification of data on various devices such as desktops, network servers, and wireless devices that should be backed up. Hard copy materials are packed using methods such as scanning the papers into digital formats that can be stored easily and packed with the digital data (Wallace, Webber, & Webber, 2011).
Google uses a variety of methods for backing up its data. Among them include the use of cartridges, USB drivers with large capacities, tapes, and integrated backup software. The storage of the data takes into consideration the need for the same storage as the original data of the organization. Similarly, the company has embraced online methods of data backup over the recent past to ensure enhanced security (de Guise, 2008). For instance, the company has embraced the use of the "cloud" technology to ensure effective and safe storage of organizational information. The technology relies on the use of software in the computers of the company that backs information automatically. Data backing is done regularly to ensure ease identification of lost data and adoption of the necessary steps to recover and prevent future occurrences of similar events (Fulmer, 2005).
Data recovery refers to a process whereby an organization salvages data from damaged, corrupted, failed, or inaccessible secondary methods of storing the data. The ease of data recovery varies from one system to another depending on the complexity associated with the recovery process. Data recovery process used in Google occurs in four main stages that encompass the above-discussed phases of disaster recover. Among the steps, include repairing of the affected hard drive, imaging the drivers into a new disk or drive, logical recovery of files, and repairing the damaged files during the process. Data recovery allows for the adoption of anticipatory measures to loss of different organizational components such as the environment of the computer room, hardware within the company, software applications, connections to the devices, and data and restoration centers (Snedaker, 2007).
In addition, Google has developed internal controls for data recovery that aims at ensuring effective coordination of the recovery processes. The internal controls work under the principle of configuring hardware to use similar software applications, thereby, uniform storage of organizational information. A number of vendors also provide the company with hot sites for recovery the lost data. The hot sites are configured to host data security, streams, and applications that can be managed easily within the organization (de Guise, 2008). The vendors also provide the company with data detection and filtering of threats arising from malware, thereby, enhancing security of organizational data. Developing disaster recovery plan for the company starts with the compilation of the inventory hardware, data, and software applications that are vulnerable to access by third parties. As such, combining these efforts ensure effective management of organizational data and safety (Fulmer, 2005).
Business continuity plan
Continuity of organizational activities affects the analysis of its operations, thereby, disrupting organizational functions and processes. The plan allows the company to identify internal and external threats that are likely to affect the performance and the realization of the desired goals of the organization. The continuity plan encompasses various activities such as alternatives for recovering from different disasters that alter the normal running of organizational activities. Similarly, the systems of ensuring continuity of business plan allows for the breaking down of malware and threats that are likely to affect the normal functioning of the organizational systems. The success of the business continuity plan used by Google relies on different forms of business analysis such as impact, threat, and analysis of impact scenarios. Impact analysis allows the company to differentiate between…
Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.
The first time that they attempted to build this system they did not follow the life cycle plan and the system ended up failing. Developing a new claims payment system that will talk to and be user friendly with the customer service management system would help to speed up efficiency and enhance quality of all departments within the organization. This streamlining would help the company as a whole to
Cracking the Code The contemporary issue of physical security/IT security Modern day businesses and organizations face the contemporary issue of physical security/IT security. Whether a business needs to maintain network security for a website or server, or an organization needs to restrict access to a server room, there are several aspects facing the problem of dealing with IT security. Any general computer networking instructor teaches the DOD and/or OSI networking models and
Migration Project for Tony's Chip The focus of this document is to develop an internally hosted Website Migration Project for Tony's Chip Company. The website will have a back-up site that will serve as a failover in case the original site goes down or unavailable. To assist Tony's Chip Company building a dynamic Website that provides a disaster recovery plan, and minimal downtime to ensure that the site is available
Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning