Verified Document

Innovation In Business Process Management Cordys: Innovation Case Study

Innovation in Business Process Management Cordys: Innovation in Business Process Management

SWOT analysis identifying the issues facing CORDYS

Strengths

The main strong point for Cordys is their UNIX programming software, which has made customers more independent of Cordys. The software is strong and has an incredible speed. Cordys has a provision of integrating different languages compared to similar programming software; features have been added to the localized programming software. Cordys' information is well organized. The company boasts on their products, which are their major strength that has generated a great user base. This has improved trust to their shareholders and customers. Moreover, Cordys are engaged in development work, which (workers have been allowed 25% of their time to focus on personal projects) encourages innovation thus, keeps Cordys in a moving condition (Saxena, & Bharadwaj, 2010).

Weaknesses

The management at Cordys has admitted that it is increasingly becoming impossible to strike the difference between average content, good content, and real good content. This is because the programming software lacks the capability of checking whether all the information is credible. This has led to the emergence of strategies of optimizing software. Even in the case where a businessperson is more credible, competitors who might exhibit knowledge about algorithms of Cordys might acquire more business. Cordys deal with software where information is maintained through organized strategies. Therefore, it is easy to manipulate the information. Many users are not familiar with many products offered by Cordys such as UNIX and ERP solutions (Brocke, & Rosemann, 2010).

Opportunity

The increased use of programming software such as UNIX and upcoming technological trends have revolutionized the 21st Century for all human beings who are questing for knowledge and information. Cordys provide programs such as UNIX and ERP, which enables companies to do automatic upgrading thus making the process superfluous rather than the manual risky upgrading. This has proven to be a key customer attraction and a source of revenue. Cordys obtains 98% of its revenue from Oracle, HP, and IBM. The company has been regularly involved in acquiring new programs such as UNIX. Such programs are being utilized in over 90 companies. Moreover, Cordys boasts of an enormous customer base such that any product addition becomes popular than any other original idea. For instance, ERP solutions have been given a double traffic just because it is associated with Cordys. Therefore, Cordys has been submerged in the river of opportunities (Fleischmann, 2011).

Threats

Cordys is facing harsh competition posed by other software providers such as Google and Salesforce.com. These two companies have demonstrated massive growth with their turn over increasing by 20% in the first fiscal year. These are potential emerging threats to Cordys. Frequent changes in customer preferences have led to a high expectation of high standard products, which companies such as Oracle, Google, IBM, and back office have focused on as their primary agenda. All emerging industry players are following emerging technological trends. In this industry, Cordys have taken the time and failed to mitigate current technology: this poses a major threat (Johnson, Scholes, Whittington, 2008). More importantly, Cordys have maintained their focus on other industry players such as Oracle and SAP. With the company's strong and fast programming software, it exhibits a unique long-term competitive advantage in the industry thus; diverting from this would be the worst threat for Cordys (Saxena, & Bharadwaj, 2010).

2. PESTEL analysis at CORDYS

Political

The government released a list of blacklisted and banned software companies that feature information about culture and politically sensitive topics. This was used for blacklisting individuals in the list (Cruz-Cunha, & Varajao, 2011). The government issued an order requiring all software providers to issue IP addresses, phone numbers and account numbers of their customers. The government asked these providers to issue websites used by customers under the law of pledge of self-regulation and professional industry ethics. Cyber cafes were required to set up software, which could block sensitive information, and patrons visiting this content had to display their real identification documents (Johnson, Scholes, Whittington, 2008). The government has launched a $100 million system of surveillance known as Gold Shield that seeks to monitor how the civilians use software. This led to the creation of over 4,000 job opportunities for mentoring and censoring software in the country. Law enforcer made frequent appearances on the screens reminding software developers and users to hold back from the access of sensitive content (Fleischmann, 2011).

Economic

The country lacks full-bloomed media. In addition, most software users are 25 years old. This age group is mostly associated with entertainment software. Most software users in the country use software to find entertainment and songs. This situation has been worsened by the increasing...

Reports indicate that most software consumers are aged between 18 to 24 years and are well educated. The usage of programming software is concentrated in coastal provinces and cities.
Technical

Currently, the government is monitoring the traffic of all foreign software through installation of routers at every border. In this regard, law enforcers have facilitated the project of enabling the borders to filter sensitive software. Advanced technological improvements have forced existing and emerging software companies to follow benchmarks wet by the industry.

Legal

A report on world information technology revealed that there is a low intellectual protection of property, judicial independence, quality competition, property rights and legal framework efficiency in the software industry. The police have been deployed to monitor and censor the development of software (Johnson, Scholes, Whittington, 2008).

Environmental

The increasing environmental population in the country presents a huge market potential for Cordys.

Stakeholder analysis

Different stakeholders have different levels of involvement in the company. Cordys has identified their stakeholders according to their relationship with the company such as functional linkage (suppliers of raw materials), enabling linkages (regulatory businesses and investors), normative linkages (competitors and industry players) and lastly, diffused linkages (media and non-governmental organizations). Employees and investors are vital and fundamental for the operations of Cordys. For this reason, the company has prioritized the stakeholders according to their relationship with the firm. In this regard, investors and employees are the most important stakeholders. (Fleischmann, 2011).

Industry lifecycle

The software industry has multiple well-established players such as Google and Oracle who have focused on profits, development of new products and innovations. These companies are the major sources of products offered in the industry. The economy is improving and the software industry is changing. This is because of new product innovations, industry, and financial climate. The industry is attractive thus providing software companies with the capability to reinvent themselves and continue to develop innovations and inventions. Further, these industries have gained the capacity of expanding into new industries (Cruz-Cunha, & Varajao, 2011).

3. Porter's five forces analysis

Computer software is an attractive sector involving many players. Nevertheless, in order for any company to attain a viable influence, it calls for both resources and innovation. This poses a challenge to the entry of new players: it allows existing players to have the ease of branching into another industry (Brocke, & Rosemann, 2010).

Low power of suppliers

The bargaining power of suppliers is low and is likely to remain down as long as Cordys maintain their strong dominance position in the market. Because they are using the ad system, which generates more income, both the receiver and advertisers are clients of Cordys. Cordys' UNIX and ERP software have been increasingly gaining popularity and generating surplus sales. Thus, suppliers of Cordys' products seek to ensure that a good relationship with Cordys is maintained. This has pushed suppliers to an extremely powerless position in the market (Saxena, & Bharadwaj, 2010).

Buyer Power

There is a strong buyer power in both the computer software and internet industries. Competitors are many hosting alternatives for Cordys' offerings. Advertisers contribute about 90% of Cordys income although the services are not charged. If consumers decide to use alternative services, the number of advertisers could drop down thus affecting Cordys' bottom line. In addition, so many companies are creating business management software that provides consumers with the option of not purchasing Cordys' products. This has enabled buyers to have the potential of controlling prices if they reach a consensus that Cordys' products are too high (Fleischmann, 2011).

Rivalry among competing firms

While Cordys have the largest competitors such as Oracle, Google, SAP and saleforce.com, it is still holding the commanding position in the industry. Studies reveal that Cordys' UNIX and ERP software are the most widely used in the industry. Further, the company's innovation such as ERP is used as bench setting in the industry. Oracle and salesforce.com make frequent updates on their services yet they have focused on capturing the success of Cordys (Johnson, Scholes, Whittington, 2008). During the introduction of Cordys' ERP solutions, the company placed itself competitively against Google and Oracle. It remains true that Cordys' UNIX is the best in the market. Therefore, many players are trying to develop products such as UNIX. This has made the market be saturated. Nevertheless, no single company has the capability of creating…

Sources used in this document:
References

Brocke, V., & Rosemann, M. (2010). Handbook on business process management introduction, methods and information systems. Berlin, Springer

Cruz-Cunha, M., & Varajao, J. (2011). E-business managerial aspects, solutions and case studies. Hershey, PA, Business Science Reference

Fleischmann, A. (2011). Subject-oriented business process management: Second International

Conference. Germany, Berlin, Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

UNIX Marketability Requirements UNIX and Job Marketability,
Words: 1558 Length: 5 Document Type: Essay

UNIX Marketability Requirements UNIX and Job Marketability, 2012 UNIX is the most-used operating system powering enterprise today, surpassing Microsoft Windows and all other operating systems combined. UNIX is also the foundation of the Linux operating systems, many variants of open source software, and is also in large part the theoretical foundation of the Google Android operating system (Sen, Singh, Borle, 2012). As a result of the pervasive adoption and widespread standardization on

Unix/Linux There Are Many Operating
Words: 870 Length: 3 Document Type: Term Paper

Unix provides many more options to an administrator, and having a consultant may help decide what methods would be best for the individual circumstances; administrators making the switch from other platforms will be used to having to just make do with whatever is available rather than being able customize options for best fit. Being the administrator of a server is a skilled task, and is not something that should be

Unix/Linux Systems Vulnerabilities and Controls
Words: 1233 Length: 4 Document Type: Essay

6.30. When there are no restrictions for unprivileged users and if the option for config_rdskernel configuration is set, hackers can write arbitrary values into kernel memory (by making specific types of socket function calls) since kernel software has not authenticated that the user address is actually found in the user segment. The lack of verification of the user address can provide hackers to gain privileges and access to areas that

UNIX Systems Have Been Instrumental in the
Words: 2595 Length: 10 Document Type: Term Paper

UNIX Systems have been instrumental in the information systems management of corporations and organizations for many years. Although in recent years it has been overshadowed by other operating systems, it still remains as an alternative to other systems. The purpose of this discussion is to describe the benefits and problems associated with UNIX systems. The most beneficial aspects of UNIX are the robust nature of the system and the ability to

UNIX Is, Likely, the Oldest
Words: 1059 Length: 3 Document Type: Research Paper

Write programs that handle text streams, because that is a universal interface.' This philosophy evolved to fully permeate every part of the programming industry. Furthermore, the philosophy of using text streams further improved Unix's universality. In the mid-70s the cat got out of the bag. Unix spread through the academic world like wildfire and soon into the corporate world. Because of a pre-existing anti-trust suit, AT&T -- the parent company of

UNIX Vs. Windows Operating System
Words: 2430 Length: 6 Document Type: Research Paper

The Windows operating system architecture also allows for single sign-on and also relies on user name and password verification. The authentication process for a Windows operating system at the server level can also be configured to validate the identity of the person logging in at the Windows domain and Microsoft Active Directory Service levels as well. Certificates can be assigned to specific applications, databases and processes within a Windows sever-based

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now