Premium Essay

Swat Analysis of Software Company

In:

Submitted By myintthein
Words 4799
Pages 20
A SWOT Analysis view of the software development industry

Georgios Kormaris
Department of Information and Computing Sciences,
Utrecht University, Utrecht, The Netherlands gkormari@cs.uu.nl WWW home page: http://www.cs.uu.nl/

Introduction

I n the past twenty to thirty years many changes and developments have taken place in the software industry which started off during the 1960s mainly in the United States of America and experienced a revolutionary boom since the 1980s, Steinmueller, (1995).

There are many different ways and methods of developing software and planning the strategy of a software development company, as we can derive from many recent research projects. Most of these projects are usually concerned with the way that software is developed and not with the way that the strategy of the company as a whole is planned, Cusumano, MacCormack, Kemerer, & Crandall, (2003). Another important factor is which techniques and methods are used to analyze company’s environment and how the strategy is formulated and implemented.

In this paper we analyze a popular method for strategic planning which has been mostly used for product portfolio planning and strategic planning on an abstract level, as stated in a research paper by Houben, Lenie, & Vanhoof, (1999). We will focus our interest in the software industry and base our research on the case study of the Austrian software industry as it is presented by Bernroider, (2002). Additionally, certain guidelines are going to be presented, in order to carry out a successful internal and external analysis for any software development company.

Combining these two types of analysis, certain criteria of a company’s core competences and main weaknesses are drawn. This method is called SWOT Analysis, which was developed by Albert Humphrey during the 1960s, as part of a research project for Stanford

Similar Documents

Free Essay

Venquest

...Entrepreneurship         Individual  Assignment:  Case  Analysis       Lecturer:  Prof.  Dr.  Mohd.  Hassan  Mohd.   Osman     Prepared  by:   Mohammad  Pazyar   Matric:  MR111216                     Spring  2014   VendQuest  (A):  The  Business  Idea     Introduction   Obviously   as   it   appears,   there’s   a   unique   e-­‐commerce   solution   is   made   up   by   Conti.   To   make   a   pragmatic   decision   whether   or   not   he   should   commence   on   his   business,  a  visionary  analysis  seems  inevitable.  It  seemingly  seems  very  crucial   to   have   a   SWAT   analysis   table   first   to   best   categorize   the   strengths,   Weaknesses,   opportunities  and  threats.  Accordingly,  it’s  needed  to  go  over  each  of  them  and   conclude  on  the  case  if  it’s  feasible  for  him  or  not  to  start  up  his  venture.     SAWT  Analysis  Table:  (based  on  the  facts  in  the  case)       Strengths     • Strong  background  in  both  construction  and   equipment  management...

Words: 1315 - Pages: 6

Premium Essay

Business

... As well, it has proved its worth at companies far removed from the relatively slow-clockspeed, manufacturing-intensive automotive industry. This paper describes the analysis process, the decision model, and the resulting improved process for value chain strategy at GMPT. The value analysis process emphasizes the need to balance quantitative financial considerations with less-easily quantifiable strategic issues. This model not only provided key decision support for value chain strategy, but also formed the foundation of a fast-response capability to emergent and disruptive strategic challenges. We describe why such a capability is of critical importance not only to companies such as General Motors, buy also to companies in very fast clockspeed industries such as on-line music and entertainment. Arvin Mueller, Group Vice-President of GM Powertrain from 1997 through 2001, comments on the Value Chain Strategy and its role in the strategic governance of GM’s global powertrain operations: Without a structured process for value chain strategy and formation, dealing with a rapidly changing business model in a huge, complex, and global industry provides only a hit-or-miss destiny. A systems approach to value chain strategy led to a partitioning of “Knowledge Assets” and “Supply Capabilities” within the vast business of engineering and manufacturing engines, transmissions, and control systems for the world’s largest automotive company. Application of consistent criteria to...

Words: 6946 - Pages: 28

Premium Essay

Ooooooo

... Submitted by Ahamed Shahriar Hasan ID#112103064,Sec:A MBA Program, Spring- 2013 MGT 607: Strategic Management Table of Content Topic Page 1. Historical Background 03 2. Service render by online bank 03 3. Digitization policy of Government and the progrees of online bank 04 4.Business level strategy persue and their success status 07 5.Trend on online banking 09 6.SWAT analysis 10 7.Possible measures to online banking 11 8.Conclusion 12 1.Historical background of online banking: The term Internet Banking or E-Banking Internet both are used as supplement. E-Banking is the one of the major part of E-Financing. E-Banking is web-based Banking. In other words E-Banking refers to the banking operations, which is done over World Wide Web. However, more comprehensive and well-established definition is given...

Words: 2852 - Pages: 12

Premium Essay

Unit 500v1 Personal Development as a Manager

...CMI LEVEL 5 – MANAGEMENT & LEADERSHIP UNIT 5001V1 – PERSONAL DEVELOPMENT AS A MANAGER & LEADER CANDIDATE: PAUL KITCHING DELIVERER: ANGELA TURNER – OPEN SKIES MANAGEMENT DATE: 15/10/15 WORD COUNT TARGET: 2500 – 3000ACTUAL 4596MAIN BODY - 3000 | CONTENTS PAGE [1] Terms of Reference.…………………………………..………………………………………..3 [2] Summary………………………………………………………………………………………….3 [3] Introduction…………………….………………………………………………………..……….4 [4] Methods of Investigation..………………………………………………………….………....4 [5] Personnel Professional Development as a Manager…………………………….…........4 [6] Bibliography…………………………...…………………………….…….…………….….….12 [7] Appendices………………………………………………………….…….…………….…..….13 [1] Terms of Reference In this scenario, I have been asked to assess the Personal Development I would require in order to be fully proficient in a new position I have been recently recruited for similar to that of my current manager. This is to be demonstrated by the following means: 1. An Assessment and plan for my personal professional development 2. A plan for the resources required to support my personal professional development 3. Detail how to implement and evaluate my own personal development plan 4. Describe how I will promote staff welfare in my new job role In line with my current employer I have written this assessment as though I have been promoted to Project Manager (PM) which is a similar role to my line...

Words: 4671 - Pages: 19

Premium Essay

Workplace Privacy

...Workplace Privacy: Privacy Rights in the Workplace Marisol Cortez National University Legal Aspects of Business I Law 304 Jack B. Hamlin, M.S., J.D. October 23, 2011 Abstract Workplace Privacy: Is an employer issued search of employer issued property to their employees a violation of the employees’ Fourth Amendment right of freedom from unreasonable search and seizure? This paper will examine the decision of the U.S. Supreme Court to the case of City of Ontario v. Jeff Quon that has provided a significant change of the views on workplace privacy law in this country. The majority of U.S. employees believe that it is their constitutional right to have reasonable workplace privacy. However, most U.S. employees are unaware that their constitutional right to privacy is contingent upon the U.S. Constitution’s Fourth Amendment’s rights to freedom from unreasonable search and seizure. This constitutional right is generally applied to state actions and they are at times limited to protecting only federal, state, and municipal employees. Furthermore, this paper will discuss the influences of Fourth Amendment jurisprudence to private sector employment because of the parallel common law standard of “reasonable expectations of privacy” which is the primary piece of the Electronic Communications Privacy Act (ECPA) the federal legislation suggesting employee privacy interest in prohibiting unlawful access and certain disclosures of contents in certain forms of communication...

Words: 1639 - Pages: 7

Premium Essay

Report

...Facilities . . . . . .13 Administration Public Safety Communications . . . . . . . . . . . .14 Support Services . . . . . . . . . . . . . . . . . . . . . . .16 Personnel Bureau Training Bureau Management Services . . . . . . . . . . . . . . . . . .21 Finance Payroll Grants Administration Fleet Services Facilities Management Court Services Unit (CSU) Alarm Enforcement Unit (EAU) Records Management Front Counters/Telephone Report Unit Automation and Digital Records Crime Analysis Unit (CAU) Property/Evidence Unit Operations Field Operations . . . . . . . . . . . . . . . . . . . . . . .29 Neighborhood Policing Centers (NPCs) Management Accountability Program (RPD~MAP) Watch Commanders Problem Oriented Policing (POP) Bike Team El Protector University Neighborhood Enhancement Team (UNET) Crime Statistics Special Operations . . . . . . . . . . . . . . . . . . . . .39 Community Services Group Citizen Academy Crime Free Multi-Housing Neighborhood Watch Business Watch Youth Court METRO/SWAT & Aviation Special Weapons and Tactics (SWAT) Mobile Field Force (MFF) Emergency Negotiations Team (ENT) Aviation Unit Traffic Bureau Field Accident Investigators Police Motor Officers Major Accident Investigations Team (MAIT) Traffic Investigations Follow-up Traffic Program Supervisor Parking Enforcement Tow Enforcement School Crossing Guards Traffic Education Illegal Street...

Words: 22303 - Pages: 90

Premium Essay

Downsizing

...SCHOOL OF BUSINESS BMIS300 – Management Information System Sec: D Beirut campus Analysis of Mc Donald's Information System Done By: Rawan Al- Masri To: Dr. Abdo Haidar Year: Spring 2015 ACKNOWLEDGEMENT First of all I'm thankful to Almighty Allah who gave me strength for the completion of this project. Next, I'm heartedly thankful to my most respected and honored course instructor of Management Information System, Dr. Abdo Haidar who gave me an opportunity to do this project, and for his guidance, efficient teaching, and cooperation. . This study greatly acknowledges the cooperation and assistance of all those employees of McDonald’s, whose favors have helped me to precede my project, for that I'm very grateful. Table of Content 1. Executive Summary 2 2. Organizational Overview 3 3. Issue Analysis 12 4. Analysis of Information Systems 14 4.1 Customer relationship management 14 4.2 Knowledge Management 19 4.3 E-Procurement and McDonald’s 25 4.4 Supply Chain and Logistic Management Definition 29 5. Details Analysis of suggested Systems 35 6. Organizational Impact of Recent Systems 36 7. An overall analysis of organization 40 Conclusion: 42 Reference 44 Analysis of Mc Donald’s Information systems Executive Summary McDonalds is the world's largest chain of burger fast food and perhaps is one of the fastest and rapidly growing fast food chain restaurants in the world. It uses various...

Words: 8679 - Pages: 35

Premium Essay

Cisco

...Cisco Systems, Inc.: Implementing ERP [HBR case #699022] Reviews Cisco System's approach to implementing Oracle's Enterprise Resource Planning (ERP) software product. This case chronologically reviews the diverse, critical success factors and obstacles facing Cisco during its implementation. Cisco faced the need for information systems replacement based on its significant growth potential and its reliance on failing legacy systems. The discussion focuses on where management was particularly savvy in contrast to where it was the beneficiary of good fortune. Cisco was highly successful with its enterprise resource planning (ERP) effort. What accounts for this success? What were the most important things that Cisco did correctly? Cisco’s success is greatly attributed by its 100% dedication of their teams to complete this project. It started with the senior management team approval and support. This includes its core ERP team of 20 which expanded to 100 after the board approval. Also included is the Executive Steering committee which also worked countless hours to meet this deadline. Even the hardware vendor who was an executive sponsor probably had 30 people on site at one point. This big financially but it was a great reference for them. The core ERP team represented a cross section of Cisco’s business community who were experts in its field . They were very structured and organized dividing the large 100 team into 5 process area teams or ‘tracks’. Each track had a Cisco...

Words: 3591 - Pages: 15

Premium Essay

App Programing

...Builders/Designers  Event Driven Programming  Application Programming II Rapid Application Development and Prototyping Rapid Application Development and Prototyping What is RAD? 3 RAD Approaches 4   Rapid Application Development (RAD) is a development lifecycle designed to give much faster development and higher-quality results than those achieved with the traditional lifecycle. It is designed to take the maximum advantage of powerful development software that has evolved recently (Martin, 1991). By using a series of proven application development techniques, within a well-defined methodology, organisations can quickly and cheaply develop systems without compromising on quality . Rapid Application Development and Prototyping Barry Boem’s spiral model  James Martin's RAD methodology  Agile methods  Rapid Application Development and Prototyping 1 2/29/2016 What is RAD? 5 What is RAD? 6 Dr. James Martin came up with the RAD software development methodology/approach in the late 1980’s.  This was in response to the non-agile Stagewise or Waterfall Models methodologies of the 1970s. Unlike the traditional conventional approaches, RAD emphasises development rather than specification and planning.  It is thus a flexible and rapid development process where requirements are modified as the project progresses and more knowledge is gained.  For instance, rather than concentrate on design specifications...

Words: 3016 - Pages: 13

Premium Essay

Student

...BIS-3318 COPYRIGHT Published by the International University of Management Windhoek, Namibia © International University of Management 2009 No part of this publication may be reproduced, stored in retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of the publishers. International University of Management 59 Bahnhof Street Private Bag 14005 Windhoek Telephone (264 61) 245150/84 Fax (264 61) 248112 E-mail: ium@ium.edu.na Website: www.ium.edu.na TABLE OF CONTENTS Chapter 1 System Development Fundamentals System Design Methods Structured System Analysis and Design Method (SSADM) Rapid Application Development (RAD) Joint Application Development (JAD) Skilled Small Team Development End of Chapter Questions Chapter 2 The Design and Implementation Process End of Chapter Questions Chapter 3 Assessing Systems Impact Prototyping End of Chapter Questions Chapter 4 Design for User Tasks and Organizational Requirements Stages of a BPR Development Project End of Chapter Questions Chapter 5 System Implementation and Security User Involvement Change Over Strategies End of Chapter Questions References MODULE OUTCOMES • Differentiate and access different system design methods. • Evaluate different systems implementation issues...

Words: 10875 - Pages: 44

Premium Essay

Ipv6

...Mit 576 e-commerce 1)  With the aid of a diagram, describe a typical e-commerce model and how the various e- commerce technologies are implemented in your model? According to Dictionary.com * Commerce is a division of trade or production which deals with the exchange of goods and services from producer to final consumer * It comprises the trading of something of economic value such as goods, services, information, or money between two or more entities. Commonly known as Electronic Marketing, e-commerce is explained below. * “It consist of buying and selling goods and services over an electronic systems Such as the internet and other computer networks.” * “E-commerce is the purchasing, selling and exchanging goods and services over computer networks (internet) through which transaction or terms of sale are performed Electronically. The Business Process is described below, * A consumer uses Web browser to connect to the home page of a merchant's Web site on the Internet. * The consumer browses the catalog of products featured on the site and selects items to purchase. The selected items are placed in the electronic equivalent of a shopping cart. * When the consumer is ready to complete the purchase of selected items, she provides a bill-to and ship-to address for purchase and delivery * When the merchant's Web server receives this information, it computes the total cost of the order--including tax, shipping, and handling charges--and then...

Words: 4480 - Pages: 18

Free Essay

Nas for Organization

...NETWORK-ATTACHED STORAGE FOR SMALL COMPANIES Case: Design Foundation Finland LAHTI UNIVERSITY OF APPLIED SCIENCES Degree Programme in Business Information Technology Bachelor Thesis Autumn 2012 Jari-Pekka Koivisto Lahti University of Applied Sciences Degree Programme in Business Information Technology KOIVISTO, JARI-PEKKA: Network-attached storage for small companies Case: Design Foundation Finland Thesis in Degree Programme in Business Information Technology, 56 pages, 11 pages of appendices Autumn 2012 ABSTRACT This study focuses on finding the proper solution to create Network-attached storage (NAS) for a small company. This study was commissioned by Design Foundation Finland, aiming to improve the security and the management of the information. This research will be aiming to find the proper way to design and implement a network storage, which will be used as the main data storage within the company for creating an ideal solution for data maintenance, security and ease of access to all the data of the foundation. The outcome of the thesis is a solution, which is created from scratch, offering a design and implementation of an NAS in a small company with a relatively small budget. The case foundation is located in Lahti. The foundation was established in 2009, aimed to improve and support the education (of design), as well as research and development of design. Design Foundation Finland also has an own R&D group to improve the design of Finnish products in several...

Words: 10025 - Pages: 41

Free Essay

Linux as a Personal Desktop Operating System

...Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need to Use This Book.........................................................................................................4 What Is Linux? ........................................................................................................................................5 Linus Torvalds and the Birth of Linux.............................................................................................5 Why Choose Linux?.........................................................................................................................6 What Is Red Hat Linux 9?................................................................................................................7 What Is Covered in This Book?..............................................................................................................8 Conventions in This Book......................................................................................................................9 Customer Support...............

Words: 155032 - Pages: 621

Premium Essay

Chinese

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security Policies: Where to Begin A company that realizes that they have unfortunately been applying security in an ad-hoc fashion and have not put the necessary security policies in place to reduce the risk to their corporate assets, has hired you as the Security Officer. They have implemented many of the standard security products and technologies (firewalls, anti-virus, IDS, etc.), but they find viruses and intrusions still occur. As the newly appointed Security Officer you are to develop their security policies and procedures from top to bottom to ... Copyright SANS Institute Author Retains Full Rights AD Security Essentials V1.4b Title: Security Policies: Where to Begin Name: Laura Wills Date: December 12, 2002 Introduction A company that realizes that they have unfortunately been applying security in an ad-hoc fashion and have not put the necessary security policies in place to reduce the risk to their corporate assets, has hired you as the Security Officer. They have implemented many of the standard security products and technologies (firewalls, anti-virus, IDS, etc.), but without the policies and processes defined, they find viruses and intrusions still occur. As the newly appointed Security Officer you are to develop their security policies and procedures...

Words: 6709 - Pages: 27

Premium Essay

Cisco

...included, had taken a risk in joining the project. Rewards should, and would, be generous. The size of the bonus pool, though, made Solvik think: they had done well, but how well? What had gone right? What had gone wrong? Given another project of this magnitude and risk, would they be able to do it again? No tC Cisco Systems, Inc. was founded by two Stanford computer scientists in 1984 and became publicly traded in 1990. The company’s primary product is the “router,” the combination of hardware and software that acts as a traffic cop on the complex TCP/IP1 networks that make up the Internet (as well as corporate “Intranets”). With the rise of Internet technologies, demand for Cisco’s products boomed and the company soon began to dominate its markets. By 1997, its first year on the Fortune 500, Cisco ranked among the top five companies in return on revenues and return on assets. (See Exhibit 1 for Cisco’s financial performance.) Only two other companies, Intel and Microsoft, have ever matched this feat. Perhaps even more impressive, on July 17, 1998, just 14 years after being founded, Cisco’s market capitalization passed the $100 billion mark (15-times 1997 sales). Some industry pundits predicted that Cisco would be the third...

Words: 9328 - Pages: 38