Preview

The Truth Behind the Billion Dollar Story and Lessons for the Dod

Good Essays
Open Document
Open Document
26520 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Truth Behind the Billion Dollar Story and Lessons for the Dod
Secretary of Defense
Corporate Fellows Program

FINAL REPORT
ORACLE CORPORATION

Lt Col Linda R. Medler, USAF
May 2002

ORACLE CORPORATION
THE TRUTH BEHIND THE BILLION DOLLAR STORY AND LESSONS FOR THE DOD

by
Linda R. Medler, Lt Col, USAF
A Research Report Submitted to the Faculty
In Partial Fulfillment of the Graduation Requirements
Advisor: Mr. Eric Briggs, Director, Secretary of Defense Corporate Fellow Program
Washington, DC
May 2002
Disclaimer
The views expressed in this academic research paper are those of the author(s) and do not reflect the official policy or position of the US government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government.
Contents
Page
DISCLAIMER ii
ILLUSTRATIONS vi
TABLES vii
PREFACE viii
EXECUTIVE SUMMARY xiii
ORACLE CORPORATION 1
Products and Services 2
Database 2
Tools and Applications 2
Consulting 2
Education 3
Support Services 3
Research and Development and Software Security 4
Financial Information 5
Leadership and Culture 7
Quality and Culture 7
The “Ellison” Factor 8
STANDARDIZING BUSINESS PROCESSES 12
Simplifying the Business 12
Sell Side, Buy Side, and Inside 13
Sell Side 14
Buy Side 17
Results of the Buy and Sell Process Transformation 21
INSIDE: CORPORATE RESTRUCTURING 23
Business As Usual—Fiefdoms and Stovepipes 23
Business in the Old Organizational Structure 23
A Simple Example--Marketing 24
Mandate for Change 25
Admitting there’s a Problem—the First Hurdle 25
Business the New Way 26
The Shared Services Model 27
Human Resources or the “B2E Transformation” 28
The Same Story for Finance 30
Eating Their Own Dog Food 33
Shared Services and Self-Service Lessons for the DoD 35
IT CONSOLIDATION AT ORACLE 39
Snap-Shot of IT Consolidation 40
Oracle’s E-Business Philosophy 41
Consolidating E-Mail—An Idea Who’s Time Had Come 42
E-mail Consolidation Approach 43



Bibliography: Interview with Ed Allen. Vice President-Development-Defense. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: September 28, 2001. Baum, David and others. “Oracle 25 Years of Technology Innovation.” Oracle Magazine, November/December, 2001, pp. 65-82. Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001. ________________________ “Information Security: Shell Game or Reality?’ Lecture. Secretary of Defense Corporate Fellows Company Day. Oracle Chief Security Officer. Oracle Corporation, Redwood Shores, VA: March 6, 2002. Davies, Ted Dragan, Richard V. “Clash of the Titans.” PC Magazine, March 26, 2002, on-line, Internet,25 April 2002, available from http://www.pcmag.com/article/asp, p Entis, Ira. “Homeland Security.” Oracle Customers-DoD. Lecture. Oracle Government Education and Healthcare, Reston, VA: 14 May 2002. “Final Report of the Secretary of Defense Corporate Fellows Program, 2001-2002.” Secretary of Henley, Jeff. Chief Financial Officer, “Driving e-Business Shareholder Value.” Briefing, Oracle Corporation, Redwood Shores, CA: Quarter 2, 2001. Interview with Tim Hoechst. Senior Vice President-Technology, Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: September 27, 2001. Interviews with Cindy Kuzemka. Business Development Manager, Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 8, 2001 and October 11, 2001. Interviews with John Miller. Vice President-Development-Defense, Oracle Government, Education, and Healthcare, Oracle Corporation, Reston, VA, August 24, 2001 and September 28, 2001. Interview with Jim McFarland. Vice President-Advanced Programs, Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: September 27, 2001. “Oracle 9i Application Server Unified Messaging 9.0.2.” Oracle Corporation, n.p. available on line: http://messaging.us.oracle.com/collateral, 2002. Oracle Corporation. 2000 Annual Report. (Redwood Shores: 2001), on line, Internet, 25 April 2002, available from:

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    References: 1. (2010). Principles of Computer Security: CompTIA Security+ and Beyond (2nd ed.). : McGraw-Hill.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Limits: Poor Basic replication regarding integration, Oracle real application testing, Enterprise Manager, Automatic Storage Management, Java Support, Temporal Database,SQL Pattern matching, Flashback Data archive, Data Masking, Application Security, Secure Application roles, and Proxy Authentication.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The views expressed in this paper are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government.…

    • 2024 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Example of Good Resume

    • 442 Words
    • 2 Pages

    |Promoted to Lead Student Ambassador in Fall 2004; supervised 10 – 15 Student Ambassadors. |…

    • 442 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Leahy, Patrick. "Support for the USA PATRIOT Act." Washington, DC. Senate Floor. 25 Oct. 2001.…

    • 2253 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Federal Tort Claims Act

    • 1331 Words
    • 6 Pages

    Assistant Secretary of Defense for Homeland Defense and America 's Security Affairs. (n.d.). Retrieved September 22, 2004 from http://policy.defense.gov…

    • 1331 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: (1) Information technology in business: Let me count the ways. (1992). CIO, , 1-1. Retrieved from…

    • 5678 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Homeland Security

    • 3491 Words
    • 14 Pages

    King III, C. (2009). The Department of Homeland Security An Organization in Transition. JFQ: Joint Force Quarterly, (55), 152-159. Retrieved from Academic Search Premier database.…

    • 3491 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Oracle Rman Pocket Reference

    • 15833 Words
    • 64 Pages

    Publisher : O'Reilly Pub Date : November 2001 ISBN : 0-596-00233-5 • Table Contents of Pages : 120…

    • 15833 Words
    • 64 Pages
    Powerful Essays

Related Topics