logo

Article On Era of Globalization

   

Added on  2020-04-01

16 Pages4745 Words55 Views
IS StrategyWritten By:

1Nature of the businessIn the era of globalization as well as technological advancement, Google has tried toplace their position in the mind of cyber users, like the powerful search engine over theinternet and it’s also used widely as the web-based search engine all over the world (Alberts& Dorofee, 2002). It doesn’t matter, whether it's old or young, Google can always be seen inthe conversation about computers or internet (Axelrod, Bayuk & Schutzer, 2009). One canview the history about how the companies enhance from small too big and are also identifiedall over the world. The core business of Google is to offer the search engine to the cyber user,who is interested in going to their place of interest (Alberts & Dorofee, 2002). The searchengine of Google tries to attract various internet users through simple design, but outcomesare quite amazing search outcome (Axelrod, Bayuk & Schutzer, 2009). After the startingstage of the Google setting itself at the global position, it started selling the ads related to thekeywords of search. The ads were text-based to increase the loading speed of the page(Alberts & Dorofee, 2002). Most of the revenue of Google depends on the ads, and they hadattained success with the support of AdSense and AdWords in the system after attainingexperience within the industry (Alberts & Dorofee, 2002). For developing the expected IT infrastructure, the department of IT try to maintain thebalance among the purchasing of products from the outside vendors and try to draw up thesoftware; for instance the organization purchase of the software from Oracle for maintainingthe accounts; whereas, when the case of managing the customer relationship management,Google try to develop the software (Alberts & Dorofee, 2002). Through the administration ofthe company try to create the data, that is made available to every employee, it also tries tomake sure that the information is protected from getting misused or either used through theunauthenticated users (Alberts & Dorofee, 2002). Google even try to encourage the use ofopen source software through applying it. It also initiates the students to work and develop

2the new software through offering the internship programs. In this manner, the company triesto attain new ideas that can be supportive (Alberts & Dorofee, 2002). Google also seeks todevelop the similar applications such as Google Apps that can be applied for the external andinternal purpose (Axelrod, Bayuk & Schutzer, 2009). The algorithm search engine iscontinuously updated, so that retrieval of information could get more relevant (Alberts &Dorofee, 2002). The engineers ensure that the retrieval of information for the internet user getless. Google also adopts the round robin policy, which supports them in load balancing ofserver load. The servers of Google are categorized in various types, and every server isassigned with a particular function (Axelrod, Bayuk & Schutzer, 2009). The business nature makes the Google emphasize the aspects of security and try tomake it critical for Google (Axelrod, Bayuk & Schutzer, 2009). The master search algorithmof the formula is to keep things secret. Instead of trying to implement the measures of strictpolicy, the organization ensures about the organization infrastructure as secured (Axelrod,Bayuk & Schutzer, 2009). The focus is placed on the corrective and detective controls. Morethan 150 engineers are hired for offering the information security as well as for maintainingthe organization security infrastructure (Axelrod, Bayuk & Schutzer, 2009). The engineersregularly view the virus-like Spyware, and Google makes use of intrusion detection systemfor avoiding the breach of security (Axelrod, Bayuk & Schutzer, 2009).Governance structures, processes, and policies it has in placeIt can be mentioned that, for the type of technology and innovation, Google producethe culture, governance as well as process as perfectly applied for generating the assistance ofan idea one another (Axelrod, Bayuk & Schutzer, 2009). The top executives hold instinct fortaking the company and agree with them, in case they ask for hostile takeovers to place long-term vision (Axelrod, Bayuk & Schutzer, 2009). The model of media might be right as

3compared to them, as both of them are reliant on the talent and vision. The culture of creativecorporate is fabulous for attracting the Googolplex as the right playground for developing themagic of Google (Axelrod, Bayuk & Schutzer, 2009). The process of organization ofpermitting the staff for using 20% of the work time in combination with the teamwork stylethat looks like a right formula for developing the dirty and rough prototype that it exploredthe value that could create entirely through the alpha to beta (Axelrod, Bayuk & Schutzer,2009). The only types of limitation that can view the ego possibility in the manner of doingthe right work and the company’s size eventually turn the staff and businesses customers(Axelrod, Bayuk & Schutzer, 2009). This could be branding issue for Google in the comingtime over how to deal with the increase in huge companies (Axelrod, Bayuk & Schutzer,2009). The commitment of Google towards security is outlined through Code of the conductof Google, along with security philosophy of Google (Eloff, Labuschagne, Solms & Dhillon,2011). All these policies include the huge array of the security linked with the topics, whichincludes the necessary policies that each staff should comply with physical security, account,data as well as few specific policies including the systems and internal applications, whichare expected by employees to follow (Eloff, Labuschagne, Solms & Dhillon, 2011). All thesesecurity policies are reviewed and updated periodically. Staff is also needed to attaincontinuous security training over the security topics like the safe internet use, how to label,handle the sensitive information, and working through the remote location safety (Axelrod,Bayuk & Schutzer, 2009). Extra training is also provided about the interest policy topics,which includes the areas of emerging technology like safe use of social technologies andmobile devices (Eloff, Labuschagne, Solms & Dhillon, 2011). The security organization of Google is divided into various teams, which emphasizeover the auditing of global security, information security, and compliance, along with

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
PEST and Porter's Five Forces Analysis of Google
|6
|1196
|301