Case # 7

Posted by Wilfredo A. Deldo Jr.

Computer System Security

Dedicated Computers

It’s advisablezzz to use only one computer to store important, sensitive information for a business. When several computers hold different pieces of important data, the possibility of someone or something gaining access to the information increases.

Defragging

It is quite basic really but the consistency of this will help your computer and help your wallet as well because your Laptop or Desktop will see less trips from a computer technician. Over time with all the files on the hard drive things get fragmented, kind of like a disorganized office with papers everywhere, so it takes a little while for the computer to find the file that was selected. But when the computer is constantly defragmented or organized, it is easier for the computer to find the files you are looking for.

Deleting cookies

Cookies are little files that help you load your favorite websites a lot quicker and sometimes if entered into the wrong type of website they would put cookies on your system and send you to pop-up hell, and what type of websites usually send that type of cookies your way. Thats right porn sites..

But by deleting your cookies every couple of days can help keep your computer running the way it should instead of being bogged down by a ton of tiny files.

Turn your computer off and disconnect it from the network when not in use.

A hacker can not attack your computer when you are not connected to the network or your computer is off.

Make a boot disk on a CD or floppy disk.

In case your computer is damaged or compromised by a malicious program you will at least be able to boot your computer with the boot disk. You will need to make this boot disk before you experience a hostile breach of your system.

Install additional basic threat counter-measures
In addition to the three universally needed security software programs discussed above, there are a couple of other software installations which can be basic necessities for you, depending upon your particular computer usage.

Disable file sharing on your hard drives

While securing your wifi router will help keep hackers from getting access to your network, what about the potential for harm from people who already have legitimate access to your network? Having a firewall will certainly help, but it may not be enough.

One of the best ways to limit your exposure to intra-network harms is by prohibiting file sharing access from foreign machines. This is especially important if you are on a large scale or open wifi network, such as at a college library or in an office building, where you do not know who could be potentially browsing through your PC.

Be cautious when downloading

While not all freeware is bad, the old saying that nothing worthwhile in life is free is generally true when it comes to free internet downloads. Spammers often hide dangerous malware in computer programs that they then offer for free on the internet. When you choose to download these free programs, not knowing they are infected, you circumvent your firewall and anti-virus protection, and as a result often open yourself up a serious malware infestation.

Do not use a neighbor's wifi connection

Often hackers setup free, seemingly unprotected wifi connections in convenient locations such as apartment complexes and airports. While these unsecured connections might just be an individual who hasn't taken the time to protect his network, they might also be "honeypots", or traps set by hackers to snag your personal details

Strengthen your web browser security

You connect to the internet through your internet browser. And whether you use Firefox, Internet Explorer, Opera or anything else, this is a point of major weakness in any computer's defenses. Hackers often target their attacks on your computer by focusing on flaws in browsers or their plug-ins and using drive-by downloads, to get your computer to download malware through the browser without you even knowing that something was downloaded. Because of this threat, web browser security upgrades are an important early step in your PC security overhaul.

Case #6

Posted by Wilfredo A. Deldo Jr.

Republic Act No. # 7394
Consumer Act of the Philippines



As i can say about the article of CONSUMER ACT OF THE PHILIPPINES the laws under it, they produce a peaceful and order country to prevents us from any harmful behaviors of other people, abusing powers and other criminal act like the law of advertising material that involve in this part of entertainment shall have a limit in order to understand the rights of other to advertise there product as well some of the laws is mentioning foods and product warranties, imitation and product protection from children they proposing the most legal law to provide us safety of our living the laws indicates the reason to protect us from violence from products and awareness to our health the law provide a good model to help us as a one community and one nation.

Cas #5

Posted by Wilfredo A. Deldo Jr.



How new technology is rewiring our brains?

You think your car radio is broken because it doesn't display the name of the song and the artist. You tap a word on a paperback and wonder why the definition doesn't automatically pop up. You swipe a digit across the screen of your cell phone and all you get are fingerprint smudges.

Then you remember: That isn't a satellite radio. You're reading an actual book, not a Kindle. It's not a smart phone, it's a dumb one. You were expecting the cool capabilities of new technology--from old technology.

"It used to be we wanted to keep up with the Joneses," says Christine Louise Hohlbaum, author of The Power of Slow: 101 Ways to Save Time in Our 24/7 World. "Today all we want is to keep up with our gadgets. Technology pervades every aspect of our lives. Our touchscreen existence has literally rewired our brains. Our behavior is also informed by the technology we use. We tap, ping, and Skype, all day long."

So sometimes we get a little flummoxed when confronted by something that isn't digital--like a door that actually requires a key, or a book whose pages don't turn by themselves, or a TV that plays shows in real time with no skipping past the commercials.

Is this a common problem, or are we just spoiled geeks? We asked around. Turns out we're not the only ones who regularly have out-of-technology experiences. Here are some typical ones.

A Lifetime Subscription to TiVo

In researching this article, we found that by far the greatest response was from people who've grown so accustomed to TiVo and other digital video recorders that they want to use them everywhere--not just on TVs, but on movies, car radios, and even conversations.

"Since I can so easily rewind television shows using my TiVo, I am constantly trying to rewind my radio to hear something I've missed," says Kim Dushinski, author of The Mobile Marketing Handbook. "But I knew I was totally spoiled by technology when I started to want to rewind actual conversations with people. ('I know she told me her name two seconds ago, but I forgot it already. I'll just rewind...oh wait...crud.')"

We can think of other applications. You're taking an awfully long time to get to the point, so I'll just fast-forward through the boring preamble. Gee, that was amazingly cute thing my four-year-old just did. Let me replay that.

"I was driving down the highway, and I saw a billboard that I thought was hilarious," says Joe Paone, president of PR firm Bee Elevated Communications. "But my wife missed it. My immediate instinct was to press rewind so my wife could see it."

Regrettably, unless you live inside a cheesy Adam Sandler movie (which would be cause for regret of another magnitude), life does not come with an embedded DVR. For better or worse, we're all stuck with real time.

Just Like an eBook, Only With No Batteries

Remember when publishers used to print books on paper? Actually, they still do. At least for now, anyway. But sometimes it's easy to forget.

"I was reading a book last night, and I wondered whether something I'd just read had been mentioned earlier in the book," says Dianne Smith, a sales professional in Manchester, Massachusetts. "I wanted to do a search back through the preceding chapters to find the reference. Then I realized I was reading print and would have to flip back page by page. I laughed at myself. But I do love the good old-fashioned pleasure of page turning."

Sharing electronic text can be a simple matter of pressing a few keys, says Matthew Kammerait, marketing and social media specialist for Quad/Graphics, a $5 billion book and magazine printer in Sussex, Wisconsin. Sharing a physical book? You might have to exchange actual molecules.

"Working on my iPad, iPhone, laptop, etc., I've become very used to sharing just about everything I find interesting with others to foster dialogue," says Kammerait. "When I'm reading a printed book, I find myself looking for Share widgets on the page."

That's okay, Matt. We won't tell your bosses.

You Can't Touch This

Once you've gotten used to a smartphone that has a multitouch interface, it's hard to pass a normal screen without at least trying to tap, swipe, or pinch it. Good luck with that.

"I'm so used to my phone being touchscreen that every time somebody hands me a BlackBerry or something, I expect that to be a touchscreen," says Dan Nainan, a comedian/actor and self-described computer genius. "I've also actually started to touch my laptop screen, even though it is not a touchscreen."

Maybe Nainan ought to rethink the genius part. Still, he's hardly alone. Gleb Budman says that he, too, finds himself assuming that all screens are touchscreens.

"I walked into a Borders bookstore a few weeks ago, needed to find a specific book, and couldn't quickly find a person to help me," recalls Budman, CEO of Backblaze, an online backup service. "I saw a big screen at the information desk showing various books and tried tapping it to search. Tap. Tap tap. Tap tap tap. Oh, it's a 'dumb screen.' Back to searching for a person."

Even if it a display is a touchscreen, it may not respond to your touch in exactly the way that your own touchscreen device does.

"As owner of an HTC Evo and an iPad, I constantly attempt Android gestures on the iPad, and vice versa," says Jeff Sass, chief evangelist for mobile entertainment provider Myxer. "I'm always frustrated when they don't produce the same results. "We are spoiled by the gestures we learn, which is frustrating when we move from device to device."

Where's the Undo Button When You Really Need It?

You've reached the punchline of a tasteless joke just as the conversation in the room hits an unexpected lull. That priceless antique vase from your wife's late aunt is now a jumble of shards on the floor, thanks to your oafishness. You've slaved and sacrificed your entire life to raise your kids, and now they can't even be bothered to return your calls.

One of life's great tragedies is that it lacks an Undo button. But that doesn't stop people from trying. Josh Kelly, a principal of Fine Design Group (who possibly spends a little too much time inside Adobe Photoshop), can relate.

"All of us who work a lot on computers have become very accustomed to the shortcut that allows us to 'undo' our last action," he says. "I've literally had situations on the phone where I've said something, or I've made a wrong turn while driving, and I've thought 'I'll just undo that with a keystroke.' I've also decided to do things thinking that I'll just undo them if they don't work out. All of these things can be undone, but sometimes with considerably more effort than pressing Command-X."

Suffering From Prius Envy

Driving used to be simple: Put your key in the lock, open the door; put your key in the ignition, start the car. Now there's a remote control for everything--well, almost everything.

Harry E. Keller, Ph.D, owns a 2004 Toyota Prius, which he starts by pressing a button on the key fob. But when Keller, president of Paracomp, an Internet-based instructional software company, rents cars while traveling, he often finds himself sitting in the driver's seat, fumbling with the keys in his pocket and wondering why the car won't start.

It's not just cars. In today's push-button world, we tend to expect all doors to operate electronically. Keys? Aren't those something your parents used to carry?

"I have inadvertently waved my RFID dongle or clicked my car remote at my apartment door (which uses a traditional key) only to find that it isn't open when I crash into it," notes Martha Ciske, a social media executive in Orlando, Florida. "A few squashed groceries can be replaced, but I have to admit my pride gets a little squashed too."

Don't worry Martha, you're in good company.

"At least a couple times a year, I try to lock the door of my home with my car remote or, even more embarrassingly, with the television remote," admits Crystal Washington, a marketing strategist based in Houston.

Ruined by the InterWebs

The Internet has given us "information at our fingertips." So now that's where we want it, all the time. And when we can't have it, well, some of us get a little cranky.


Case #4

Posted by Wilfredo A. Deldo Jr.

1. What is IT Outsourcing?
• Outsourcing of IT processes - this may range from infrastructure, to software development, maintenance and support.
• Outsourcing - also a subcontracting a process, such as product design or manufacturing, to a third-party company

The concept of taking internal company functions and paying an outside firm to handle them. Outsourcing is done to save money, improve quality, or free company resources for other activities. Outsourcing was first done in the data-processing industry and has spread to areas, including telemessaging and call centers. Outsourcing is the wave of the future.

•The definition of outsourcing, basically started in the late 80's, is certainly correct. frequently, the exact operations (people, equipment, etc.) were sold to an outside party to run. So in data processing for example, the entire computer department became owned/employed by say IBM who ran it at a fixed cost, or all accounting functions were taken over by an outside firm for a specified fee. It was thought the original company didn't have to deal with employee issues, benefits, etc. I would dispute it is the wave of the future. Like many ideas the promise frequently didn't live up to the reality. Many companies are bringing back in house the outsourced functions after finding: Others don't operate any cheaper, and are frequently more expensive. The loss of direct control over who handles their affairs, the caring of those people about the company, and effect on other stakeholders, wasn't worth it and was even a detriment. (For example, many of the customer service centers outsourced to India are being brought back as customers are unsatisfied, opportunities to benefit the company in accounting processes weren't pursued - things like a new report was only done at a high direct cost, etc.)

2. Advantage and Disadvantage

Advantage
The benefits of Outsourcing are:
-Less capital expenditure - For example, by outsourcing information technology requirements, a company does not have to buy expensive hardware and software.
-Less management headache - For example, by outsourcing business process such as accounting, a company no longer has to hire and manage accounting personnel.
-Focus on core competencies - Outsourcing non-core related processes will allow a business to focus more on it's core competencies and strengths, giving it a competitive advantage.

Disadvantage
-Before deciding on outsourcing your company's business process, keep in mind the disadvantages of outsourcing:
-Less managerial control - It may be harder to manage the outsourcing service provider as compared to managing your own employees.
-Outsourcing company goes out of business - If your outsourcing service provide goes bankrupt or out of business, your company will have to quickly transition to a new service provider or take the process back in-house.
-May be more expensive - Sometimes it is cheaper to keep a process in-house as compared to outsourcing.
-Security and confidentiality issues - If your company is outsourcing business processes such as payroll, confidential information such as salary will be known to the outsourcing service provider.

3. Implication

•When the Dow Jones stock index recorded its largest single-day loss in late September 2008, many investors panicked. But billionaire investor Warren Buffet took a different stance – declaring the time was right to buy United States stocks. Buffet saw opportunity amidst chaos. That’s a lesson the electronics supply chain would do well to consider in current economic times, industry executives argue.

“When business starts to go bad, people panic. As a result, they tend to abandon their long-term strategic course, scrambling for short-term relief,” said Greg Frazier, executive vice president, supply chain business development worldwide, Avnet Electronics Marketing, Phoenix. For example, Frazier has recently fielded a flurry of calls from small and mid-size OEMs asking about outsourcing – customers that had previously decided that outsourcing was not the right fit for their company. And though under the right circumstances outsourcing can certainly provide an OEM with significant opportunities for savings, it is no panacea. “When they hear major OEMs like Sony announce plans to close 10 percent of its plants worldwide and shift more manufacturing to outsourcing, they question their (manufacturing) decisions,” Frazier noted.

Supply chain integrators like Avnet work closely with OEM customers to evaluate the pros and cons of outsourcing, said Frazier, who cautions companies to be particularly vigilant in their evaluation of suitability and financial stability of potential contract manufacturing partners. A recent report from electronics research firm iSuppli Corp. found that the global electronics contract manufacturing sector has begun to feel the impact of the slowdown.

Growth in 2008 for the contract manufacturing sector is estimated to be almost half of the 16.1 percent recorded in 2007. “As the end markets erode die to recession, the trickledown effect will cause less significant revenue growth for electronics supply chain participants, including electronic manufacturing service providers (EMS) and original design manufacturers (ODM),” said Adam Pick, principal analyst, EMS/ODM, for iSuppli, El Segundo, Calif.

OEMs must also carefully consider the regions in which they plan to outsource. “Everyone’s automatic assumption is that Asia is the go-to region. But when you factor in energy costs, which have only recently begun to come down again, and rising labor rates, local alternatives like Mexico can be very attractive,” said Frazier.

When selecting an EMS partner, it's also important to remember that one size does not fit all, said Craig LaBarge, chief executive officer and president of LaBarge, Inc., a St. Louis-based EMS provider. “Depending upon the nature of their business, OEMs will have different expectations for their outsourcing partners. Our core competencies are very different than those of a provider that's set up to produce large volumes of a consumer-oriented product, for example.”

LaBarge's niche is producing low volume, high-rate-of-change, high-complexity electronic assemblies, which may be used in applications ranging from military and aerospace to industrial and medical.

While the current economic environment presents an excellent opportunity for OEMs to further utilize outsourcing as a way to reduce their manufacturing and design costs, there are challenges and difficulties that come with this kind of change. “In our experience, the most successful situations are those where the customer understands that outsourcing is as much a cultural change as a strategic one for their organization,” LaBarge noted.

The bottom line is that even in the best of economic times, the decision to outsource should be made based on a careful cost/benefit analysis. “This is not a quick, short-term solution,” said Frazier. “Every OEM must consider their options based on their individual circumstances and goals, and not make a knee-jerk reaction based on what others are doing.”

Posted by Wilfredo A. Deldo Jr.

1. What is facebook?
Facebook is a social networking website intended to connect friends, family, and business associates. It is the largest of the networking sites, with the runner up being MySpace. It began as a college networking website and has expanded to include anyone and everyone.
Facebook was founded by 2004 by Harvard student Mark Zuckerberg and originally called thefacebook. It was quickly successful on campus and expanded beyond Harvard into other Ivy League schools. With the phenomenon growing in popularity, Zuckerberg enlisted two other students, Duston Moskovitz and Chris Hughes, to assist. Within months, thefacebook became a nationwide college networking website.

2. What is the advantages and disadvantages of facebook?
Facebook - a popular name among those who are so into it. Individuals who have an account in Facebook are now using more of their time to socialize with other people amidst the distance and lack of time. And even if a community like Facebook serves numerous advantages, it also proves to have certain disadvantages as well. There are now series of improvements in the system just to make up with the shortcomings. Arguments regarding the different advantages and disadvantages of Facebook are stated below.

Advantages
• Allows user search for new and old friends
• Accessible to chosen universities having a high level of security
• Makes it less awkward when communicating with strangers or people you are not familiar with
• Love attraction - can be used as a dating service system
• Makes it easier to join groups having similar likes and dislikes
• Allows members to check students who are taking the same class, living within the same area, or coming from the same academy

Disadvantages
• Overcrowding
• Weakening long distance relationship
• Unsupported by physical adjacency
• Contributes wide-range procrastination
• Rampant addiction
• Stalking is possible
• Acquaintances be labeled as friends

3. What are the characteristic of facebook? Why people engage in this site?
• Facebook doesn’t begin the conversation, it enhances it
• They are non-interruptive ,
• They integrate multiple social mediums ,
• They don’t strive for 1:1 communication, but they are active ,
• They use Facebook to create evangelists

Poeple are engage in facebook because it is famus easy to use and very friendly to use for any people and everywhere in the world people are much attracted because of friends are always socializing in the internet speacialy when they are far and at home.
4. Can you use facebook in E-commece? How & Why?
Between music, virtual gifting, gaming and retail goods, Facebook is turning into a virtual online mall of sorts. E-commerce app is the ability to allow shoppers to carry their goods with them across thousands of Payvment-powered storefronts on Facebook. It makes shopping on Facebook almost like shopping at Target, where you can visit multiple departments and buy all of your diverse purchases at once. Users can also add comments and reviews to Payvment-enabled storefronts.

As retailers flock to Facebook for both brand awareness and e-commerce, Payyvment’s free offerings are attractive because the platform is a one-stop shop for both efforts. However, Payvment isn’t the first to implement this strategy; 1-800-Flowers started offering discounts to users who became fans of its page last July. The startup, which just raised $1.2 million in funding, faces competition from BigCommerce, Alvenda and others.

5. How important facebook in the society today?
In terms of creating a social network, the Facebook generation is likely to see the melding of online friends with friends in the local area as a natural part of developing a well-rounded circle of acquaintances. The online social network may or may not overlap with the local group of friends, but it will be considered just as important in terms of encouragement, support, and the exchange of knowledge. Tools built into sites such as Facebook allow users to convey emotions, share data, and interact in ways that are much more efficient than earlier online efforts. With visual, verbal, and oral capabilities now common on these sites, the interaction is very similar to a face-to-face conversation.

Case #2

Posted by Wilfredo A. Deldo Jr.

IO(Chef Information Officer)

The chief information officer (CIO), or information technology (IT) director, is a job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. The CIO typically reports to the chief executive officer, chief operations officer or chief financial officer. In military organizations, they report to the commanding officer.

Global Warming

Global warming is the increase in the average temperature of Earth's near-surface air and oceans since the mid-20th century and its projected continuation. Most of the observed temperature increase since the middle of the 20th century was caused by increasing concentrations of greenhouse gases, which results from human activity such as fossil fuel burning and deforestation. Global dimming, a result of increasing concentrations of atmospheric aerosols that block sunlight from reaching the surface, has partially countered the effects of greenhouse gas induced warming.

Effect Of Computers

The state of knowledge of global warming will be presented and two aspects examined: observational evidence and a review of the state of computer modeling of climate change due to anthropogenic increases in greenhouse gases. Observational evidence, indeed, shows global warming, but it is difficult to prove that the changes are unequivocally due to the greenhouse-gas effect. Although observational measurements of global warming are subject to "correction," researchers are showing consistent patterns in their interpretation of the data. Since the 1960s, climate scientists have been making their computer models of the climate system more realistic. Models started as atmospheric models and, through the addition of oceans, surface hydrology, and sea-ice components, they then became climate-system models. Because of computer limitations and the limited understanding of the degree of interaction of the various components, present models require substantial simplification. Nevertheless, in their present state of development climate models can reproduce most of the observed large-scale features of the real system, such as wind, temperature, precipitation, ocean current, and sea-ice distribution. The use of supercomputers to advance the spatial resolution and realism of Earth-system models will also be discussed.

Effect of Computers in a Certain Company and in Our Planet

As our technology grows and more people using computers and it can cause so much heat to our planet. In any company computers are more important. Data center in a company is used to facilitate computer systems and associated components, such as telecommunications and storage systems. It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls (e.g., air conditioning, fire suppression) and security devices. IT department in a company is a major source of negative environmental impacts. The best way to reduce heat in our planet is to less consume of power because the IT is the biggest consumer of power.

According to Senior Editor Stephanie writes that Data Centers consume between 1.5% and 3% of all the power generated annualy in the United States. A certain Company called VistaPrint, where the IT departments does manage its data center facilities, discovered that its electric bill was projected to skyrocket if the comapny, which sells custom printed products online grew as predicted. Data Centers of VistaPrints hosted by "Cable and Wireless". The use of "hydropower" provides a renewable lower-emmisions of source electricity. The company replace its blade servers with virtul machines that use more server capacity and consume less power.

Using efficient coolong systems, or simply sealing holesin your data center's floor, can reduce energy consumption and ultimately , greenhous gas emmission.

Data Center Server that Consume Less Energy

Startup server maker SeaMicro today unveiled a new low-power server that promises to slash power costs for companies running large Internet services and cloud computing platforms. SeaMicro’s multi-core x86 server runs on Intel’s low-power Atom chips, whose energy efficiency has made them the processor of choice for many mobile phones and laptops.


The Green Advantage

Generally, the shift to green IT is of multiple benefits. Those benefits can positively affect your return of investment making the switch all worth it. And just what are those benefits?


•First and foremost, green IT is a help to the environment. The use of them reduces the already big pile of e-waste. For instance, a simple move of replacing fluorescent bulbs with energy-efficient lights will lessen the number of burnt bulbs dumped into landfills. How? Well, high-efficiency light bulbs tend to last longer which means they require lesser replacements.

•Green IT helps you save money. Most eco-friendly technology devices are energy- efficient which means that they consume lesser energy. And in a business, that translates to less electricity to pay for.

•The first two benefits leads to this third benefit. This refers to personal fulfillment. Knowing that you have helped save the planet while earning something out of it is a very wise move that creates a sense of nobility and fulfillment.

The "GOOGLE"

Posted by Wilfredo A. Deldo Jr.

Google is a highly successful internet business. Recently they have broaden their scope with multitude new tool. Research Google business model and answer the following questions below. You may add additional information not included in this question.

1. Who are their competitors?

We face competition in every aspect of our rapidly evolving business, particularly from other companies that seek to connect people with online information and provide them with relevant advertising. Currently we consider our primary competitors to be Microsoft and Yahoo.

A year ago, named just two competitors -- Microsoft and Yahoo -- in its annual report to the U.S. . This year, Google lists 10 competitors by name in its recently filed 10-K report for 2009, including social sites Facebook, , and ; and specialty search engines that dive deep into a specific category, such as travel site Kayak and health inquiry site WebMD.

With the explosive growth of social networks acting as the door to people's online world, Google does face increased competition. But with the Mountain View, Calif.-based search giant facing a surge of antitrust and anticompetition lawsuits and allegations in the U.S. and Europe, observers and critics say the change shows Google's pressing need to make the case to regulators that it has viable competitors, and has not become too dominant an Internet force.

"There aren't a flood of new companies that have entered the market that are suddenly Google competitors that weren't there last year, but they are calling them out in a more direct way," said Greg Sterling, principal of Sterling Market Intelligence, adding that if regulators see Google as a company without legitimate competition, "that perception is a big problem for them politically."

Nevertheless, he said the rapid growth of Facebook and Twitter during 2009, and the effectiveness of specialty search engines like job site Monster.com, show that Google's "competition is broader than simply Yahoo and (Microsoft's search engine) Bing."

For its part, Google in its SEC filing calls the increasing power of specialty, or "vertical" search engines like Kayak, which allow people to root through scores of airlines for the cheapest flights, and the emergence of mobile applications on platforms like the that allow consumers to directly access a Web product without going through a search engine, "formidable" competition.


2. How have they use information technology to their advantage?

Cloud computing is in Google's DNA

Google has been pushing the technological bounds of cloud computing for more than ten years. Today, feedback and usage statistics from hundreds of millions of users in the real world help us bring stress-tested ... Expand innovation to business customers at an unprecedented pace. From our consumer user base, we quickly learn which new features would be useful in the business context, refine those features, and make them available to Google Apps customers with minimal delay. Collapse

Faster access to innovation drives higher productivity

The web is the epicenter of innovation, and Google's multi-tenant infrastructure is designed so we can push improvements to our entire customer base on short iteration cycles. We can deliver new functionality ... Expand on a weekly basis, or faster, because our systems are able to distribute updates so efficiently. In 2009 alone, we launched over 100 improvements, and customers didn't need to manage any upgrades or patches. In contrast, businesses tend to update traditional server software every five to seven years due to long release cycles from vendors and the cost and complexity businesses face implementing upgrades, especially when more powerful servers are required, like 64-bit hardware. Browser-based applications are another key ingredient in our recipe for rapid innovation. When we launch new features in our web applications, users automatically get these improvements just by refreshing their browsers. Our mobile browser applications also get new features without software updates. With traditional technology and "software plus services", client software is an innovation bottleneck. Even after back-end systems can support new features, users don't get new functionality in those environments until the software on their computers and mobile phones have been upgraded, which can be an expensive and labor-intensive project. Collapse


3. How competitive are they in the market?

Google Analytics has now been around for some time. Google Analytics is a free web application that helps web masters learn everything they want to know about how their visitors found their site and how they interact with their site. They are able to focus on their marketing resources on campaigns and initiatives that deliver ROI, and improve their site to convert more visitors.

But what can Google get in return: Competitive Market Research regarding the Search marketplace.

Using Google Analytics Aggregated data Google can collect statistics regarding other search engines and how they refer you to sites.



In effect what keywords they refer, vs. what keywords others refer. They also can get raw counts in the number of unique visitors and total visitors by referrer

This is only possible because Google Analytics is a centralized web application maintained and operated by Google vs. AWStats another common used alalytics platform which is installed maintained and operated by the webmaster.


4. What new services do they offer?
  • Google Lively was a web-based virtual environment that allowed as many as 20 people to sit in a virtual room and chat with each other. The offering debuted in July 2008 only to have Google pull the plug a mere four months later.
  • Google Print Ads was dropped earlier this year after the company’s vision of bringing web-like automation to the world of traditional media failed to materialize. The effort went belly-up just three weeks before the death of Google Audio Ads, which ended a three-year run in February after the company failed to gain traction in the radio ad game.
  • Google Answers spent a year in beta before a full-blown launch in May 2003, but the effort to create a fee-based knowledge market never gained much traction outside a small base of users and the service was dropped in late 2006.
  • The social networking site Orkut launched early in 2004 as an independent project of noted Google developer Orkut Büyükkökten and has caught fire in Brazil, a market that accounts for roughly 50 percent of its membership. The site reportedly claims roughly 100 million users, which is impressive, but Google can’t be happy that its effort is virtually unknown in Europe and North America while Facebook, LinkedIn, MySpace and others have gained such impressive traction.
  • Google Catalog Search debuted in 2001 as a way for consumers to go online to check out their favorite print catalogs that had been scanned and uploaded. Of course, retailers were already taking their inventories online themselves, and the effort was put to rest earlier this year.
  • Google Health was released as a beta test in May 2008, but the service has yet to find much of an audience among insurers or the general public. Which may have something to do with the combination of the words “health” and “beta test.”
  • The location-based service Dodgeball was shut down in 2009 after Google had acquired it four years earlier, and while Google continues to operate Jaiku – a social networking service it picked up in 2007 — the company has effectively abandoned the project. The technologies and expertise from both startups is being incorporated into other Google businesses and projects, however.


5. What them so unique?

Previously I’ve written about the corporate culture at Google and how it isn’t likely to be an easy thing to emulate. Today at work, my coworker, Jackson, showed me this post that links to a slide show that delves into Google’s internal processes. Another post that I recently read was Steve Yegge’s post on Good Agile, Bad Agile, in which Steve explores Google’s version of agile.

Needless to say, it all adds up to a lot of Google on the brain. Google, at the moment, is held up as the gold standard of software companies. They have achieved massive success and are the company almost every developer wants to work for. Ask someone in the software industry which company they want to emulate and they will likely say Google.

Obviously, if it was easy to emulate Google, everyone would have done it or would be doing it by now. The more I think about Google, the more and more I think it is going to be impossible to emulate them. Certainly you can steal some of their ideas and what they’ve pioneered and put it to use in your company, but outright copying Google is going to be near impossible.

Having touched on Google’s corporate culture, let’s look at something else that makes Google even more unique: how it grows.

One thing that has become evident to me is that Google grows in an organic fashion, unlike any other company I know of. Google develops tools that are internally useful and then releases them to the world. Google does not develop products to sell to the world. Google does not have external contracts, at least in the traditional sense, as far as I can tell.

Let me elaborate on this. Google is obviously best known for search and for ads associated with search. This is in essence Google’s one true product. It is the one feature Google developed for the outside world. When Google developed search it was no different from a small company. It is what Google has done since then that makes Google different.


6. How competitive are they in the international market?
Having studied Google abroad somewhat significantly, I believe this article provides a very naïve view on Google’s success abroad. Absolutely, Google, as any American company, needs to be extremely aware of the impression they make when entering foreign grounds, as the risk as being seen as arrogant – the ugly American – is omnipresent. And, yes, Google should continue to grow their in-country teams significantly in order to best overcome cultural and sales hurdles and take advantage of unique opportunities and the gigantic world market that is growing at a quicker pace than the U.S. market. Recent stats point to European e-commerce in a position to surge past U.S. e-commerce.

Yet, don’t attempt to fool anyone here: Google has enormous international market share. Though I’m on a plane and not able to access these stats immediately, I believe that Google has approximately a 10-point higher share of search in Europe than they do in the States. I attended an online and multi-channel retail conference in London earlier this year, and Google was constantly mentioned, and never in a bad light. I am attempting to arrange a dinner in Paris later this year or early next with top French e-commerce companies, and Google is the likely sponsor, due to their relationship with the French agency that I am in contact with and their relationship with the likely invitees. Google is dominant in most countries, with their distant following to Baidu in China and the Russian example in the article notable exceptions.

In the UK, Amazon.com and eBay have also taken off after some early slips and command a dominant share of the market. Of course, they face hurdles, most notably eBay’s fraud and trust problem, but these American brands have also experienced tremendous success abroad. And there are other huge hurdles across Europe, such as Germany’s reliance on non-credit card payments and their language and cultural barriers. The European Union is still quite segmented, and pan-European plays will rarely be successful. Yet, the world continues to flatten, and American brands can have success abroad with fewer hurdles as can international brands have success in the States.

Google has had success with other products abroad, most notably its Orkut social network which has bombed domestically to its MySpace, Facebook, and LinkedIn brethren, yet has taken off in huge countries such as India and Brazil. So, sure, Google should be sensitive to cultural sensitivities and will face different regulatory environments abroad, but the truth is that Google has been remarkably successful internationally in large part due to the international word-of-mouth generated by their product and feature set.