You are on page 1of 28

Online Newspaper Business

Plan
Today 11.19 Here is where your presentation begins yourweb.com
01
VIRTUAL AND CLOUD
COMPUTING
“The cost of trained individuals to manage complex information systems rises while the
cost of hardware and networking services falls substantially. The adoption of virtualization
and cloud computing has increased as a result of these opposing trends.”
VIRTUALIZATION
VIRTUALIZATI
ON
Virtualization is the practice of sharing or
pooling computing resources, such as
servers and storage devices. Server
virtualization provides the capability to
divide a physical server logically into many
virtual servers.
CLOUD COMPUTING
CLOUD
COMPUTING
Cloud computing is an online
service that meets computer
users' computing demands. The
cost for using the computer
resources is determined by the
time spent using the resources
and other factors.
GRID COMPUTING
RID COMPUTING
Grid computing makes use of
several servers and/or individual
computers connected to a
network, such the Internet, to
operate as one big computer.
Similar to cloud computing, a
business may pay to utilize a grid
based on how much processing
time it requires.
02
E-COMMERCE
Many different market segments have benefited from online business
potential. Retail, finance, health, entertainment and media, and travel
are some of the most well-liked market areas.
E-commerce
Examples of e-commerce
finance entertainment
Can be used when online Music, videos, news, games,
banking or in investing socialization through online
online platforms

E-RETAIL travel health


Used when there is a selling Used in following Up to date medical and
of product directions and online travel fitness information online.
bookings.
03
Enterprise
hardware
Enterprise hardware enables big businesses to organize
and store information and data using tools designed for
intensive use, maximum availability, and optimum
efficiency.
Legacy systems are frequently used by businesses. A
legacy system is an information system that has been
around for a while and is widely used inside the company.
The choice to replace outdated systems with more modern
technology is one that businesses frequently wrestle with.

Legacy system
redundant array of independent
disks
To increase data dependability, a RAID
system copies data, instructions, and
information. Mirroring, the most basic RAID
storage system, duplicates data by
simultaneously writing it to two drives. A
duplicate of the requested item is present
elsewhere in the array of disks, which
improves storage dependability in the event
of disk failure.
Network Attached Storage
A server that is installed on a network only
for the purpose of giving users and
information systems connected to the
network storage is known as network
attached storage (NAS). Since a network
attached storage server only has one purpose,
which is to offer more storage, it is
frequently referred to as a storage appliance.
storage area network
A storage area network (SAN) is a fast
network that is only used to connect to other
servers and provide storage for them. A
network with solely storage devices is
referred to as a storage area network. Other
networks and computers may quickly access
big storage capacity thanks to high-speed
fiber-optic cable that connects them to the
storage area network.
Blade servers
An entire computer server, such as a Web
server or network server, is packed into a
single card, or blade, rather as a system unit,
in a blade server, also known as an
ultradense server. Each blade server has a
network card, ports on the card, memory,
hard drive, and processor.
04
High Availability,
Scalability, and
Interoperability
Numerous metrics are used by businesses to evaluate the
effectiveness of their operations. Systems frequently have
special needs for availability, expansion capacity, and system
compatibility.
DISCUSSION

HIGH scalability interoperability


The capacity of a computer Businesses generally create
AtAVAILABILITY
least 99 percent of the hardware system, software and acquire a wide range of
time, a high-availability program, or information information systems.
system is operational and system to scale up to meet Information systems within
carrying out activities. rising performance the organization frequently
High-availability systems demands is known as need to exchange data or be
must be accessible 99.99 scalability. While a able to communicate with
percent of the time. A company doubles in size, a one another. Open
system with a 99.99 percent system that was planned, information systems are
uptime is unusable for no constructed, or bought those that share data with
more than one hour a year. when it was small may not other information systems
be adequate. more readily.
05
Back-up Procedures
Backup procedures a company adopts must be stated
clearly, documented in writing, and followed
consistently.
Types of backups
differential selective
Copy files that have Allows the user to chose what to
changed since the last full copy regardless of when last
backup backed up

full incremental continuous


Copy files that have
Copies all files from the All data is backed up
changed since the last full
computer. whenever a change is made
backup or incremental
backup
DISASTER RECOVERY
PLAN
A disaster recovery plan is a written plan
describing the steps a company would take
to restore computer operations in the event
of a disaster. A disaster recovery plan
contains four major components: the
emergency plan, the backup plan, the
recovery plan, and the test plan.
Emergency plan
An emergency plan describes the actions to be followed right after following
a catastrophe occurs. The following details should be included in all emergency
plans:

1 3
Name and telephone 2 Employee evacuation 2
numbers of people and procedures
organization to notify Procedures to follow with the Return procedures; that is
who can enter reenter the
computer equipment facility and what actions to
perform
backup plan
The backup plan specifies how an organization uses backup files and equipment to resume
information processing. The backup plan should specify the location of an alternate computer
facility in the event the organization’s normal location is destroyed or unusable. The backup
plan identifies these items:

1 3
The location of backup data, 2 A schedule indicating the
order in which, and
supplies, and equipment
The personnel responsible for approximate time by which,
gathering backup resources and each application should be
transporting them to the alternate up and running
computer facility
Recovery plan
The steps that must be followed in the recovery plan in order
to resume complete information processing operations. An
organization should set up planning committees, each of which
should be in charge of a specific type of recovery, in order to
get ready for disaster recovery. One group, for instance, is in
charge of replacing hardware. The replacement of software is
handled by another.
test plan
The catastrophe plan should be tested to
guarantee that it is complete. Information
for simulating different levels of disasters
and tracking an organization's capacity
for recovery is contained in a disaster
recovery test plan. All workers participate
in a simulation and execute the processes
in the disaster recovery plan.
06
Financial plan
You can describe the topic of the section here
Thanks!
Do you have any questions?
youremail@freepik.com
+91 620 421 838
yourcompany.com

CREDITS: This presentation template was created by


Slidesgo, including icons by Flaticon and infographics &
images by Freepik

Please keep this slide for attribution

You might also like