Premium Essay

Siebel Assignment 1 0005 Sec B

In: Business and Management

Submitted By sandyphilo
Words 1099
Pages 5
SIEBEL SYSTEMS: ANATOMY OF A SALE What are the positives and negatives of Gregg Carman’s performance in gaining an entry into Quick & Reilly? In view of this, would you rate his performance favorably? Going forward what is most potent threat that could jeopardize Carman’s plan? Justify your answers using case facts. Siebel Systems was formed with the dual objective of being a high technology enabler focused entirely on customer satisfaction with enduring values. The company was part of the tipping point of IT being a back end function to a growth driver. It captured the most crucial aspect of this evolution, that of enabling a firm to reach out to its customers when and where the customers required service. By 2001 it had over 50% of the CRM market share, was touted to be the best in the industry in CRM solution and had global presence. It was going from strength to strength and the biggest factor contributing to this growth was its “ecosystem of partners” strategy coupled with its single minded focus on customer satisfaction. The research results were proof of how effective Siebel was in achieving its aims, garnering its customers return on the CRM investments in 9.6 months only along with a 20% increase in customer satisfaction levels, 19% increase in productivity levels & 16% increase in customer retention levels for its customer firms. In the case of Carman we need to first understand the relationship from the customers’ need. Quick & Reilly was clearly a firm in distress but with tremendous potential, given its enduring business proposition. It had reached a growth plateau due to its inability to scale up and was clearly in need for a CRM solution, the kind which Siebel was touted to be the best in the market. Carman’s style was very much in line with Siebel’s TAS framework. The first meeting between the two parties happened at a trade show. This clearly shows…...

Similar Documents

Free Essay

Apple Sec 10k Filling Analysis Chapter 1

...INTRODUCTION TO THE CORPORATE ANNUAL REPORT: A BUSINESS APPLICATION 2cd edition Complete the following before you submit your assignment. This step is required to validate your compliance with sections 107 or 108 of the 1976 United States Copyright Act.  1. Remove the front cover of the workbook and identify: * Name: Oskar Diaz de Leon                                               _. * Term: Spring1 2010                                                            . * Company:  Apple Computer Inc (AAPL)                  _    .  * Instructor:   Natasha Bell-Scott                                  _ .   2. Print out your completed electronic template.   3. Attach the following: * This front cover (completed) * Electronic solution template * Company annual report Chapter 1 - Introduction * Chapter 1: Select a Company and Gather Documents—Question 1Fill in the page numbers on the annual report where the following are located. | Required information for this workbook project. | Page No. | Required information for this workbook project. | Page No. | Financial Highlights (Not absolutely necessary, but very common in annual reports.) | 36 | Statement of Cash Flows | 59 | Chairman’s Message (President’s, CEO’s or other top official’s message or letter to the shareholders) | 36 | Notes to Financial Statements | 60 | Management’s Discussion and Analysis (MD&A) | 36 |......

Words: 1572 - Pages: 7

Premium Essay

Ifsm B-1

...protective measures that could help in mitigating cyber-crimes Ethically, cyber-crimes really boil down to what’s right and wrong. Deontological theories focus on the right action, doing the right thing, no matter the consequences. All humans on this planet have a deontological duty to do what’s right for fellow man; and committing crimes over the internet is clearly wrong. It is a basic duty of existence to treat others how you would want to be treated, and I’m sure that no one wants their identity stolen. I’m sure that the cyber-actors committing these cyber-crimes aren’t thinking about their ethical duties to mankind, but maybe, these crimes could be mitigated if everyone had a better understanding of basic ethics and morals. STEP 1- GET THE FACTS The first step in Reynolds’s approach is gather the facts. The facts about cyber-crime are staggering, “the average annualized cost of cyber-crime incurred…by US organizations was $11.56 million.” (INFOSEC, 2013) There are numerous risks on the internet, some of course more serious than others, but they all come with consequences. A cyber-attack could cause you to lose your identity, lose money, or lose all of the data you have on your hard-drive. Online cyber-crime affects nearly every enterprise on the planet, and thus, every enterprise on the planet needs to be working towards a solution; a way to mitigate these frequent attacks. “The 2013 figure is an increase of 26 percent from $8.9 million in 2012.”......

Words: 1300 - Pages: 6

Premium Essay

Assignment 1

...Innovative Company by Fortune magazine, retaining the title for five consecutive years. Series of scandals involving unethical accounting practices revealed hidden losses and misleading financial statements as well as questionable campaign contribution, securities fraud, and rumors of bribery. In 1987, Enron had a small energy-trading subsidiary in New York called Enron Oil, started and run by Louis Borget. It was fraudulent from the start. Aurthur Andersen, Enron’s auditor, warned Enron’s audit committee about the potential fraudulent acts being committed in New York, stating it would have to disclose the improper ties to the Securities and Exchange Commission (SEC). The company declared the problems immaterial and did not disclose the fake transactions to the SEC; Anderson went along with the decision. Borget caused closed to $1 billion in losses to investors. After taxes, Enron ended up taking an $85 million loss; despite, the earlier indication of fraudulent activities, Lay denied any responsibilities (McLean, Elkind 2003). Enron was famous for its use of Special Purpose Entities (SPEs) - structured financing - that has been increasingly common set of financial arrangements used by banking and other financial organizations and would play a major role in later scandals. All the technical details of SPEs are governed primarily by the Financial Accounting Standards Board (FASB) (Giroux, 2006). The basic idea is to convert asset into security based on future cash flows.......

Words: 1470 - Pages: 6

Premium Essay

Violation of Sec Rule 10-B-5 of the Federal Statue

...Memorandum To: Reader From: Date: July 11, 2014 Re: Violation of SEC Rule 10-b-5 of the Federal statue Summary Aquaman is president of a marine research company called "Underwater Leagues, Inc." On April 1, the research director of Underwater Leagues tells Aquaman that they've come up with "Oxygum," a means of breathing underwater by chewing a special kind of gum. Aquaman knows a great product when he hears it. He delays announcing the invention to the public so that he can buy all the stock he can get his hands on. He buys 50,000 shares of Underwater Leagues, at $10 a share. After the announcement, the share price skyrockets to $50 per share. a) If the shareholders bring a derivative action against Aquaman, what federal law should they accuse Aquaman of having violated (i.e., which federal statute)?  b) Did Aquaman actually violate that statute? Explain.  c) If Aquaman were found to have violated that statute, what remedy would the shareholders be able to seek (i.e., how much money would Aquaman be liable for. Issue First issue: (1) Pursuant to what federal statute would the shareholders claim Aquaman violated, and was he truly in violation of that statute? Rule Section 10(b) of the Securities Exchange Act,  Rule 10b-5, 17 C.F.R. § 240.10b, prohibit any person, directly or indirectly, from committing fraud in connection with the sale or purchase of securities. 17 CFR § 240.10b-5 (2014) is entitled “Employment of Manipulative and Deceptive......

Words: 1473 - Pages: 6

Premium Essay

Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process......

Words: 508 - Pages: 3

Free Essay

Leg500 Assignment 1

...Whistleblowing and Sarbanes-Oxley Assignment 1 LEG 500/Professor Augustine February 3, 2014 A Whistleblower by definition is someone who exposes a person or organization engaged in an illicit activity. Whistleblowers expose those that commit misconduct or an alleged dishonest and/or illegal activity within an organization. The infraction must be a violation of a law, rule or regulation and/or a direct threat to public interest, like fraud, health and safety violations and corruption. In almost every part of society the way information is given becomes the most important objective in the fight against misconduct and malpractice. Obtaining information can be difficult as those involved often make it their best interest in hiding the information from the public and authorities. It really helps to receive information regarding the wrongdoing from someone who has actually witnessed the incident, willing to come forth with intricate details. Whistleblowing can provide resolutions to certain situations by opening thought to be nonexistent and disclosed information sources and connections. Reasons behind whistleblowing can vary. Such as, when someone observes the wrongdoing within their workplace and requests to speak to a figure head of the organization to their morals. Whistleblowing becomes a much stronger case when it involves a large portion of the public. The publicly traded company that I researched was the whistleblowing of Bernard L. Madoff Securities LLC. The......

Words: 815 - Pages: 4

Premium Essay

Digital Technology Assignment 1

...CET3116 Assignment 1 – Spring 2015 1 Note: It is recommended that you save your response as you complete each question. Question 1 (1 point) Which of the following was the first type of switch used within computers? a) Transistor b) Vacuum Tube c) Integrated circuit d) None of the above Question 2 (1 point) _____Moore’s____ law states that the number of transistors on an integrated circuit doubles every 18 months. Question 2 options: Moore’s Question 3 (1 point) Which of the following is the alternative name for an integrated circuit? a) Vacuum Tube b) Chip c) Binary device d) Transistor CET3116 Assignment 1 – Spring 2015 2 Question 4 (1 point) The power of a modern computer is essentially governed by the number of ____. Question 4 options: a) Vacuum tubes b) Keyboards c) Interconnections d) Transistors Question 5 (1 point) Who was the co-founder of Intel? a) Michael Dell b) John Fleming c) Bill Gates d) Gordon Moore Question 6 (1 point) Which type of signal varies smoothly and continuously over time? a) b) c) Digital signal Analog signal All of the above d) None of the above CET3116 Assignment 1 – Spring 2015 3 Question 7 (1 point) There are a(n) _______Infinite____ number of signal values within an analog signal. Infinite Question 8 (1 point) Which of the following is a term that refers to a countable number of measurements? a) b) c) Analog Discrete All of the above d) None of the above Question 9 (1 point) ...

Words: 1250 - Pages: 5

Premium Essay

Infs 1602 Assignment B

...Forever 21 CRM and SCM Recommendations INFS1602 Assignment B z3457712 Hiu Kwan Lam, z5060301 Cindy Nguyen, z3406631 Syed Maheen Reza Word Count: 3488 Forever 21 CRM and SCM Recommendations INFS1602 Assignment B z3457712 Hiu Kwan Lam, z5060301 Cindy Nguyen, z3406631 Syed Maheen Reza Word Count: 3488 Executive Summary The purpose of this report is to outline the advantages and disadvantages of cloud- based CRM and SCM solutions, how it can enhance a business’ customer relationships and supply chain as well as balancing the risks of the use of this technology with the benefits. This report will firstly illustrate the benefits and disadvantages of implementing a cloud-based CRM and SCM solutions, in comparison to traditional on-site processes to assist Forever 21 in making a decision whether to use these CRM and SCM solutions or not. It will then describe how CRM and SCM solutions can maintain customer relationships and retention through the leveraging of an enhancing the efficiency of supply chain management and tailoring the product range through the use of these technologies. This report will accentuate the security, ethics and privacy issues that are associated with cloud-based CRM and SCM solutions. A recommendation of a specific vendor for cloud-based CRM and SCM solutions will then be provided to assist the CIO of Forever 21 in making a decision which is most suitable to a retail business such Forever 21. Table of Contents Executive......

Words: 5235 - Pages: 21

Premium Essay

Sec 320 Week 1 Assignment

...Week 1 assignment 1) Threat, risk, hazard, and peril all fall under the same category but have different meanings. A threat is an intention of causing harm. A risk is a situation with possible danger. A hazard is danger or risk itself. Peril is severe and abrupt danger. I will build a scenario to show the use of these words in proper context. A military network does not have a physical firewall nor a software based antivirus. The threat is other countries wanting to inflict damage to this military base via cyber warfare. The risk needs two things, the threat which we just established, and vulnerability which is the lack of security measures in place within the network. The hazard is the danger of crippling the military network and or the sensitive information being lost to the attackers. The network is now under a denial of service attack inflicted by hackers from North Korea. The network is now under Peril. Overall these words are sometimes used in place of each other even though they have a specific context that they should be used in. 2) There are many things that are considered threats, risks, hazards, and perils in my organization. Working on a military base presents a great amount of these things. Our Security team must prepare to defend the environment from the threats of terrorism, active shooters, natural disasters, cyber-attacks, and more. They have a constant risk of personnel getting killed, buildings getting destroyed, and information getting stolen. The......

Words: 619 - Pages: 3

Premium Essay

Maths B Assignment

...Mathematics B Assignments: Functions Task 1. (KPS, MPS) i) With K=0, determine the function and sketch it on a suitable domain. Point A: (1, 4) Point B: (2, 2) Point C: (4, k) or (4, 0) Using the equation y = ax² + bx + c substitute the 3 points (x and y) into three equations to find the function. Point A: 1…………… 4 = 1x + 1x + 1c Point B: 2…………….2 = 4x + 2x + 1c Point C: 3…………….0 = 16x + 4x + 1c Using the simultaneous equation function on the graphics calculator, find the function of the three points and graph using Autograph. Function = y = 0.3333x² - 3x + 6⅔ ii) Systematically vary k and explore the effect of k on the behaviour of the quadratic functions produced. Point A: (1, 4) Point B: (2, 2) Point C: (4, x) Use the quadratic function y = ax² + bx + c and substitute the points into the equation to find the functions. Vary the x value to explore the effect of k in the graph. Point A: 1…………… 4 = 1x + 1x + 1c Point B: 2…………… 2 = 4x + 2x + 1c Vary points C using -3 to 3 Y value | Point C: Equation 3 | Functions | Y = 3 | 3 = 16x + 4x + 1c | y = 0.8333x² - 4.5x + 7.666 | Y= 2 | 2 = 16x + 4x + 1c | y = 0.6666x² - 4x + 7.333 | Y= 1 | 1 = 16x + 4x + 1c | y = 0.5x² - 3.5x + 7 | Y = 0 | 0 = 16x + 4x + 1c | Y = 0.3333x² - 3x + 6.666 | Y= -1 | -1 = 16x + 4x + 1c | y = 0.6666x² - 2.5x + 6.333 | Y =-2 | -2 = 16x + 4x + 1c | y = 0x²-2x + 6 | Y = -3 | -3 = 16x + 4x + 1c | y = 0.166x² - 1.5x + 5.666 | ...

Words: 1348 - Pages: 6

Premium Essay

Assignment 1

...Financial Statement Analysis FINA36675 Assignment One Information Assignment Type: Group Assignment – includes a peer evaluation. Due Date: By the end of class during Week 7. Late Submission: Late from 1 minute to 24 hours = 50% reduction on the mark received (e.g., an 8 out of 10 becomes a 4; a 7 out of 10 becomes a 3.5) Late from 24 to 48 hours = 75% reduction on the mark received (e.g., an 8 out of 10 becomes a 2) 0% thereafter Modification for exceptional circumstances at the instructor's discretion. Note: work conflicts & computer problems are not valid reasons. Groups: Maximum four students per group: You can choose your own groups. Anyone without a group at the end of week 3 will be put into a group at random. Assignment Value: 10 percent of the final mark. The assignment consists of a written report submitted through Turnitin and an in-class presentation for a duration of 10 minutes. Instructions: Step One: You are to select a public company and determine the related industry. In each class, only one group will be allowed to choose one industry group. So, if you want to do “Industrials”, your group has to be the first to request it. Assignment 2 will be based on the same Industry Groups. Step Two: Select your company. It may be an American or Canadian company. Confirm your selection with your instructor, as each group must have a unique company. Step Three: Using SEDAR http://sedar.com or EDGAR http://www.sec.gov/edgar, and other sources......

Words: 1210 - Pages: 5

Premium Essay

Unit 1 Strand B

...Unit 1 Strand B Start your brochure by setting the scene for your business idea. To do this you need to carry out research into what makes a business successful. Topic B.1 How business ideas can be successful – listed below are features ● Finding innovative solutions, e.g. Dyson ● Meeting customer needs, e.g. products or services, filling a gap, doing it better than competitors ● Identifying new needs, e.g. mentoring and coaching, using digital media (such as social networking websites) ● Being entrepreneurial – ideas of recent entrepreneurs, e.g. Tanya Budd, Mark Zuckerberg ● Importance of having a strong vision and seeing it through, e.g. Apple ● Measures of success, e.g. financial, social, customer satisfaction Research at least four businesses in the local area. For each of the four businesses, describe the business and the features that make them successful. Business name and description of the area it is in | Description of business | Features that make the business successful | Nike SU1106-08, The Street, Westfield Stratford City, London E15 1AZ | NIKE, Inc. founded on September 8, 1969, is engaged in design, development, marketing and selling of athletic footwear, apparel, equipment, accessories and services. NIKE is a seller of athletic footwear and athletic apparel across the world. | NIKE keeps their business running by providing customers with the latest shoes and brands in stores and online such as the Jordan’s, Kobe’s and the......

Words: 2103 - Pages: 9

Free Essay

The B-1 Bomber

...THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy December 17, 2015 THE B-1 Bomber: Victim of a “Buy before you Fly: Philosophy     Introduction The B-1 Bomber is a four-engine supersonic variable-sweep wing, jet-powered heavy strategic Bomber that is used by the U.S. Air Force. It was first envisioned in the 1950’s as a supersonic Bomber with Mach 2 speed, and sufficient range and payload to replace the Boeing B-52 Stratofortress. However, when it was brought into full operation, it was developed into the B-1B, primarily a low level penetrator with long range and Mach 1.25 speed capability at high altitude. The initial B-1 Bomber program was cancelled, partly because it was becoming obsolete, and also for political reasons. It was designed by the Rockwell international developers and it started service in the year of 1986 with the help of Strategic Air Command SAC. Customer and Expectations The United States Air Force USAF was the primary customer for the B-1B program, and the Strategic Air Command was the direct customer responsible for operating the B-1 Bomber. During development of the B-1 Bomber the Air Force had varying expectations which lead to it initial cancellation and regeneration of the B-1B that we know today. (Brook, 2012). The United Sates Air Force USAF expected the B-1B program to provide the advanced capability that was needed to improve their defense system. The major expectation associated with this program for the United......

Words: 1754 - Pages: 8

Premium Essay

Assignment 1

...CORPORATE LAWS AND GOVERNANCE MODEL QUESTION PAPER SECTION A CORPORATE LAWS Instructions: 1. Answer both Questions 1 and 2 and either Question 3 or 4 in Section A. Only 3 solutions will be marked. 2. When the examination is over, place your solutions to this section of the Corporate Laws and Governance examination in a separate envelope to your solutions to Section B. Q. 1. The Board of XYZ Ltd. is considering a major diversification of the Company’s activities into a new product/market area. The Board of Directors are aware of the risks of diversification away from the Company’s existing core business and are anxious to limit the resulting risks of such a move. Accordingly, they have decided that a new company, which will be a subsidiary of XYZ Ltd. Should be set up for the purpose of carrying on the new business. The Finance Director of XYZ has been asked by the Board to advise on the funding options for the subsidiary. You are have been asked by the Finance Director to assist in this task. Specifically, you are required to draft a memorandum dealing with the following issues: a) The different types of real non-possessory security interests that are recognised in Irish law. (5 marks) b) The likely terms that a bank will seek to incorporate into any debenture creating a charge over the subsidiary’s undertaking and assets. (5 marks) c) The types of charges that must be registered under Section 99 of the Companies Act 1963. (4 marks) d) The powers......

Words: 11036 - Pages: 45

Premium Essay

Siebel System

...SDM - Siebel Systems: Anatomy of a Sale 2012 Case analysis “Siebel System: Anatomy of sales part 1 & 2” Assignment Submitted to Dr. G Sridhar, IIMK Prepared by: Name - Nitesh Kumar (Roll No : ePGP-03-138) Company – Bajaj Auto Ltd (International Marketing – Africa - Kenya) 1 SDM - Siebel Systems: Anatomy of a Sale Table of Contents 2012 Table of Contents........................................................................................................................................2 Introduction ................................................................................................................................................3 Corporate culture – “Siebel”........................................................................................................................4 Distinct leadership status............................................................................................................................4 The situation................................................................................................................................................5 Quick & Reilly : A Background......................................................................................................................6 Question 1 ..............................................................................................................................................7 Question 2................................................

Words: 2048 - Pages: 9

Play Movie | AU Mixed White Wine Featuring Rawson's Retreat Chardonnay (12x750ml) RRP$189 | Die neue Spark Titan Abgasanlage für die Yamaha R6!