Preview

Servervault Case

Good Essays
Open Document
Open Document
2186 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Servervault Case
ServerVault Case

Servervault is a company in the hosting industry located in the United States which has been in operation since December 1999. A hosting company provides its customers with physical space for servers and supporting services. Servervault chooses only to operate in the managed hosting section which gives more value-added services to customers.
ServerVault attracts Internet-reliant and security-savvy customers. It also provides end-to-end solutions to customers. Servervault differentiates itself from competitors by offering high level of security protection. It also has enough bandwidth and power supply to ensure the Internet access is always available. Servervault has three sources of revenue: one-time setup fees for new customers, monthly hosting fees and fees for additional value-added services. Although the variable cost of serving an additional customer is relatively low, it requires large funds to build facilities upfront. Recently, the president/CEO and CFO want to raise some capital for its expansion. The potential investors want to learn more about ServerVault’s projected cash needs to make the investment decision.
Macroeconomic analysis
Economic background
As it can be seen from Appendix A(1), the NASDAQ composite peaked at 5048.62 in March 2000 before dropped dramatically to 3205.11 in April. The major contributor to the loss is the internet bubble. The increasing stock prices over the last few years made some investors too confident in IT companies. However, the collapse of the bubble took place in 2000, when a lot of IT companies failed. As a result, the NASDAQ composite witnesses a huge loss in the stock market. Hence, it is a good opportunity for ServerVault to get more market share.
On the other hand, Appendix A(2) illustrates that the US GDP has kept growing during the last six years, which suggests that the loss may only occur in the IT sector. The growth in GDP brings more business capital spending. (Please see

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    A virtual server is a complete installation of an operating system that runs in software pretending to be a real computer. Applications like Microsoft Sever and windows server technology in Windows Server 2008 make it possible for a single computer to host multiple virtual machines, each of which run a completely independent environment.…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Server this goes back to the OS, but with a server, you have a different level of access can be assigned to users. A report that conducted by Kaspersky Labs ("Global IT Security Risks Surve2014," 2014) stated that even virtualized have security risk that needs to watch.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    The Database Server is a very high risk of vulnerabilities because this is where important data and files are being stored in. Again, this is still an open-source software so protecting this kind of software is important to the company. A Simple Mail Transfer Protocol (SMTP) and a file server for customers’ loan applications and other personal data files are a must protect! These are open-sources too, so basically all of these server requirements are open source, no surprise. But protecting all these will require a lot of attention especially the SMTP, file server for customers’ and the database server.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    By the year 2000, more than _______ of capital expenditures by U.S.-based businesses were for IT purchases.…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    16 Day Coursebook BOWS

    • 27912 Words
    • 91 Pages

    Bulls on Wall Street 16 Day Trading Bootcamp Do Not Cite, Copy, or Distribute Without Permission Copyright © 2012 Bulls on Wall St. — All Rights Reserved Contents Chapter 1 – Introduction Chapter 2 - Technical Analysis Value of Technical Analysis Understanding the Dynamics of an Auction Market How to Follow the Flow of Money Chapter 3 - Charting Basics Chart Setup Price/Volume Relationship Intraday vs. Daily Charts Chapter 4 - Understanding Market Cycles Accumulation Run-up Distribution Run-down Chapter 5- Define Your Trading Style Daytrading…

    • 27912 Words
    • 91 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    It is extremely important to realize that security is not a single technology. A person cannot go and buy security. Security is a mindset; it is a combination of feeling safe, knowing data is secure, and being as sure as possible that the network will not go down at any moment. These are not tangible items they are emotions.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    * This price point will generate an estimated $ $51,279,412.44 in additional revenue within the first three years, a portion of which could be dedicated to supporting Atlantic in extending and solidifying its brand in the basic server market.…

    • 1535 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    RSSWORKS INC Case

    • 448 Words
    • 2 Pages

    I would strongly recommend they should take the Cloud route and invest their cloud route the investments are low and bY taking students on board and they should report to the 2 professional developers,instead of 7 they would go for 2 and once the users increase and company grows they can recruit more. Rather than going to VC go to Angel Investors they should consider the Cloud option to run their business and then for further expansion they should go the VC's if required.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CEMEX

    • 1119 Words
    • 4 Pages

    2. Consider the period prior to 1997 in the case. What are the main IT -related changes that…

    • 1119 Words
    • 4 Pages
    Powerful Essays