Preview

Symantec Erp's Turmoil an Analysis and Evaluation of Implementation of Its Erp Sysytems

Powerful Essays
Open Document
Open Document
2122 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Symantec Erp's Turmoil an Analysis and Evaluation of Implementation of Its Erp Sysytems
SYMANTEC ERP’s TURMOIL

AN ANALYSIS AND EVALUATION OF IMPLEMENTATION OF ITS ERP
SYSYTEMS

MANAGEMENT INFORMATION COURSE WORK ASSIGNMENT

BY

OLUSADE PAUL-ROTUA (0714480)

April 21, 2010

Symantec Corporation was established in 1980 and is a leading software vendor specializing in security and information management with operations in 40 countries and 17,500 employees. Since inception Symantec has grown by acquiring companies like Norton, Brightmail, Altris and other smaller software developers. The company made its largest acquisition to date in 2005, when it acquired Veritas Software for approximately $13.5 billion. Though both organisations were of similar sizes Symantec’s focus was security and information management for consumers, while Veritas specialised in storage management software geared toward large-scale licensing. Prior to the merger, the two companies had each used highly customized versions of Oracle E-Business Suite 11d, which was difficult to integrate.
As a result of the difficulty in integrating the information systems being used by both companies, an Enterprise Resource Process (ERP) Project, named “Project Oasis” was rolled out by Symantec to create a single ERP system that would be used by their partners and customers to place orders for their over 250,000 different products, reduce the cost of maintaining Symantec’s IT infrastructure and licensing fees for the enterprise software and improve customer service delivery. However Symantec had overlooked the needs of many customers while designing a technically sound but user-unfriendly ERP system, the company then set about undoing mistakes with a follow-up project, named Project Nero. The goal of Project Nero was to recapture the loyalty of customers who were disenchanted by the changes brought about by Oasis and to assure those customers that Symantec still had their best interests in mind.
Slooten and Yap(1992, p226) define ERP as an integrated multi-dimensional system for



References: -MASHARI, M., 2001. Process orientation through enterprise resource planning (ERP): a review of critical issues. Knowledge and Process Management, 8(3), pp. 175-185 Davenport, T., “Putting the Enterprise into the ELLIOTT, G. (2004) Global business Information Technology: An integrated systems Approach. Boston, MA: Addison Wesley. KANELLIS, P., LYCETT, M. and PAUL, R.J., 1999. Evaluating business information systems fit: from concept to practical application. European Journal of Information Systems 8, pp. 65–76 LIVARI, J., 1992 MARKUS, M.L. and ROBEY, D., 1983. The organizational validity of management information systems. Human Relations 36 (3), pp. 203–226 WEILL, P

You May Also Find These Documents Helpful

  • Good Essays

    BIS 220 Week 2 Proposal

    • 641 Words
    • 3 Pages

    References: Rainer, R. K., Jr., & Turban, E. (2009). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: Wiley…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    During the initial analysis of the company we noticed that there is no Information Technology Police in place. This has led to several computer systems with different software and hardware that is not compatible with one another. This is currently making the work more difficult for the employees and the staff due to the computer systems and software programs being out of date. The second analysis we conducted was a look…

    • 5638 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Piccoli, Gabriele. Information Systems for Managers Text & Cases. 2nd. Hoboken, NJ: John Wiley, 2012. Print.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: O’Brien, J. A., & Marakas, G. M. (2011). Management information systems (10th ed.). New York, NY: McGraw-Hill.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    O 'Brien, J.A., & Marakas, G.M. (2008). Management information systems (8th ed.). New York, :…

    • 761 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Livermore, Celia Romm; Rippa, Pierluigi. Journal of Global Information Technology Management, 2011, Vol. 14 Issue 3, p5-26,…

    • 1829 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    Cisco was a rapidly growing company utilizing a Unix-based software legacy package to support its core transaction processing. Given their desire to grow from a $500M to a $5B company, each functional area was tasked with deciding which applications were appropriate based on their individual need. Implementing an ERP system impacts all functional teams, and in this particular case, did result in daily outages which impaired Cisco’s ability to conduct business.…

    • 2127 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    References: O’Brien, J.A. & Marakas, G.M. (2008). Management Information Systems (8th ed). New York: McGraw-Hill.…

    • 1069 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Paper on Physical Security

    • 4681 Words
    • 19 Pages

    An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Relational Databases

    • 750 Words
    • 3 Pages

    References: O 'Brien, J. A., & Marakas, G. M. (2011). Management information systems. (10th ed.). New York, NY:…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In late 1996, Hershey Foods Corporation the leading manufacturer of chocolates, confectionaries and beverages in United States of America began modernizing hardware and software systems in the company. In an attempt to manage Y2K issues, it chose to replace those systems and shift to client/server environment, which suggest that the company had pressing needs which forced the implementation. It was to switch over to the new ERP system by April 1999 as per original plan. It chose three software vendors - SAP, Manugistics, and Siebel for implementing different software modules. The company spent $112 million and 30 months on their ERP project. The project was running as per schedule till January 1999, and when it came to the final phase of the implementation, the company faltered.…

    • 1364 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    For the Past 15 years, I have been supporting small businesses with computer problems, ranging from desktop support to network and server integration. I have been a Microsoft® Certified Professional since 1999, and a Microsoft® Certified Small Business Specialist for over a year. I ran my own company, Lyons Den Computer Services, Inc., from 1992-2007. I exclusively serviced businesses with 3-25 workstation and servers. I recently started a new position where I am working with even larger organizations, with over 100 computers per location. One thing most of these companies have in common is a great dependence on technologies such as the internet, email and network connections to the world. Unfortunately, another thing they have in common is a lack of understanding of the depth of security concerns they create by taking advantage of these technologies. One of the largest security holes is often not a missing piece of hardware or software, but a missing piece of documentation that should be in place to protect their investment in all their equipment, personnel and good company name. I am referring to an Acceptable Use Policy for their network and Internet usage.…

    • 2473 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    [5] R.Kelly Rainer, Hugh J. Watson. "Management Information Systems: Moving Business Forward." R.Kelly Rainer, Hugh J. Watson. Management Information Systems: Moving Business Forward. New York: John Wiley & Sons, Inc., 2000. chapter 8.…

    • 1430 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Hahah

    • 480 Words
    • 2 Pages

    Reference: Laudon, K. C., and Laudon, J. P. (2012), Management Information Systems: Managing th the Digital Firm, Global Edition,12 Edition, Prentice Hall.…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: 1. Laudon,K, Laudon, J(2007), Management Information systems-Managing the digital firm 10th Ed, New Jersey, Pearson Education Inc, pp 43 – 70…

    • 3506 Words
    • 15 Pages
    Good Essays