Preview

Servervault Analysis Case Study

Powerful Essays
Open Document
Open Document
1510 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Servervault Analysis Case Study
RSM322
Assignment C - ServerVault
Instructor: D.L.Losell
Name: Ching Leong Kwok
Student#: 998199088
LEC: 0201

Date: 28th June 1999
To: Board of Directors of SeverVault
From: Ching Leong Kwok
Subject: Alternatives evaluation and recommendation of ServerVault After reviewing all the potential problems that ServerVault is facing, the most crucial problem is the shortage of cash. It is because ServerVault wants to maintain its competitiveness in hosting industry. Therefore, it needs adequate cash to build more new facilities in order to expand its business in a larger scale. There are several approaches which are worth for SeverVault to consider. The first alternative is Status Quo (SQ), it means do nothing and let the business keeps running in the old way. Since Severvault is going to meet the venture capitalists who are interested in taking an equity stake in SeverVault in exchange for a cash investment, there are few possibilities that may might happen if it has decided to use Status Quo. The first possibility is that ServerVault has failed to attract those venture capitalist to invest. Then, due to the limited cash that ServerVault is holding and the negative cash flow, it will record a negative cash balance of $706422 in September 2000 (Appendix 1). Therefore, as there is no more additional capital investment in this period, ServerVault will not be able to keep operating its business and will result of bankrupt in the end. The second possibility is that if the venture capitalists invest only 5 million. This amount of capital can maintain its business in a short run. However, because investing in hosting company is classified as long term investment, and ServerVault is still in the early stage of its development. 5 million is not adequate to maintain its operation in long run. Since the cost of building the new facilities and the computer hardware are the major cash outflow, the net cash flow will still be negative. Therefore, November 2000 will be the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Biopure case memo

    • 451 Words
    • 2 Pages

    opportunity to generate revenues immediately that can be used to fund the company while Hemopure…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * Patch history * VPN * Firewall * Stateful Inspection * Whitelists-Blacklists * Boundary Encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Phantom Medical

    • 445 Words
    • 2 Pages

    Assumes any further financing would come from the VC currently negotiating to fund the company.…

    • 445 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    The Mission Critical business systems that need protection the most in the event of a disaster are first going to be the computers in each branch, followed by the servers in the central hub for intranet finances, web, inventory as well as HR services. Customers are the life blood of Sunica Music and if we cannot provide our service to them then critical business has stopped, for this our central financial software has to be running in order to record finances and communicate to the new inventory system which orders alongside the financial system.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Because of this they are looking into a new found technology which is virtualization. Virtualization is not a new concept. It has been around since the main frame computer systems. What is virtualization? It is defined as “the creation of a virtual (rather than actual) version of something, such as an operating system, a server, a storage device or network resources” (Rouse, Virtualization, 2010). Virtualization falls into three main categories: Operating System, Storage, and Applications. Because of this virtualization can be applied to almost any part of an IT infrastructure. According to Rackspace after conducting a survey found that 57 percent of companies use virtualization with their internal infrastructures (Connor, 2007). Along with that Gartner.com states that “Virtualization will continue as the highest-impact issue challenging infrastructure and operations through 2015, changing how you manage, how and what you buy, how you deploy, how you plan and how you charge” (Press Release, 2010). In this paper we will discuss server…

    • 2369 Words
    • 10 Pages
    Best Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mis 535 Course Paper

    • 2829 Words
    • 12 Pages

    A main server that is big enough to route files in it for storage can help a computer and website run faster. Just as an external hard drive can store data on it away from a computer to free up the main hard drive can help a computer run faster. Cloud storage operates in the same concept, instead of having a hard drive, there is a huge server with a lot of storage. In this paper, the company that I have chosen has issues with server space and need a newer solution to developing a better service to the company and its production facilities. I will explain what it will take to boost service speed and help the company to ship products out faster with just a solution in server space.…

    • 2829 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Huntsville Project Charter

    • 1462 Words
    • 6 Pages

    In January 2010, the board of directors of SEITZ Corporation decided to select an investment project that would best achieve the strategic goals in the next fiscal year. The key elements of the strategic plan,…

    • 1462 Words
    • 6 Pages
    Satisfactory Essays
  • Better Essays

    seabreeze

    • 1203 Words
    • 3 Pages

    Dynamic load balancing and the disaster recovery: “the workloads of the server changes, the virtualization gives the capability for the virtual machines that are more utilizing the resources of the server to be navigated to underutilized servers”. (Burger, 2012) The disaster recovery is the serious element for the IT in sea breeze, because the system crashes could make the large economic losses.…

    • 1203 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The most accurate way to assess vulnerabilities in an IT system is by penetration testing, which simulates an actual attack. It can be dangerous to both the targeted organization, as well as the penetration team. Since the testers use the same tools as an actual attacker, systems and networks could really be brought down during the “attack.” One of the biggest advantages to penetration testing is that it tests not only the security of the infrastructure, but the readiness of the response team as well. Even though a more realistic test would be performed during normal working hours when productivity would be affected, even after hours tests could cause problems. A successful attack could bring resources down and it may take time for them to come back up. All penetration testing should be signed off on by management prior to the test commencing.…

    • 591 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ACCT 404 Chapter 8 Controls for Information Security Timothy L. Baker, CPA, CITP, CMA Lecturer Certain materials used with permission of Pearson Education, Inc. publishing as Prentice Hall and ISACA Chapters 8 through 10 Security (Chapter 8) Access to system and its data is controlled and restricted to legitimate users. Confidentiality (Chapter 9)…

    • 1090 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    vm technology

    • 7032 Words
    • 29 Pages

    Among the leading business challenges confronting CIOs and IT managers today are: cost-effective utilization of IT infrastructure; responsiveness in supporting new business initiatives; and flexibility in adapting to organizational changes. Driving an additional sense of urgency is the continued climate of IT budget constraints and more stringent regulatory requirements. Virtualization is a fundamental technological innovation that allows skilled IT managers to deploy creative solutions to such business challenges. By using virtual machines, we can reduce the cost of acquisition and increase processing power of the servers needed. Also, by tapping the wide bandwidth of a high-performance processing server, we can increase the network bandwidth which is referred to as Server Proliferation.1…

    • 7032 Words
    • 29 Pages
    Powerful Essays