Free Essay

Business Case for Documents

In: Business and Management

Submitted By sumit1532
Words 255
Pages 2
Documentum | | | Setting for the Case
In November 1993 Jeff Miller, Documentum's CEO, is faced with the challenge of pursuing either a vertical or horizontal marketing strategy to route Documentum towards profitability.
Situation and Business Issues
Documentum enjoys a leading role in an emerging and potentially lucrative space. But profiting from this opportunity will require overcoming several immediate hurdles including a limited customer base, formidable competitors and unforeseen development costs.
Key Information, Facts, Assumptions
Documentum was founded in June 1990 by Howard Shao and John Newton, seasoned database engineers who aimed to develop a new class of software for automating the management of documents across an enterprise. Following three years of losses, Documentum gains traction by combining an elite management team with $5.8MM of Venture Capitalist funding.
Analysis
Enterprise document management (EDM) is a new, paradigm-busting product category with few substitutes. The category growth is small, increasing at a rate of 1%-2% year over year . Competition within the EDM category is low, as no other company was developing the "whole elephant" solution. Profitability was extremely low, given the low number of customers and long lead time to develop and deliver the product solution. The combination of these characteristics wholly describes the EDM category as being in the Introduction Stage of the Category Life Cycle . With regards to the Mode of Innovation analysis , Documentum is a new product in a new category3. No previous EDM category existed, and Documentum had no prior products in other relaunched or repositioned categories in the EDM category. |

Similar Documents

Premium Essay

Sustainability @ Macville

...writing by your assessor. Submit this document with any required evidence attached. See specifications below for details. Performance objective For this assessment learners are required to review existing policy documents and compare them to regulatory documents and current organisational usage. A report is required that outlines revised policy documents and describes the implementation process. Assessment description You are required to examine and review the MacVille policy and procedure documents(in the additional resources of your Student Workbook) to determine the shortfalls between required sustainable practices and documented approaches to the same. In doing this you will need to review current usage of resources to gain an understanding of potential for recommending change to organisational practices. After evaluation of this information, you will need to outline revised policy documents for MacVille together with a description of the approaches that can be taken to implementation of the revised policy documents. Procedure 1. Review the case study information provided (attached), policy and procedure documents (in the Appendices of your Student Workbook) and legislative and regulatory documents that describe compliance requirements for the business sector. The reviewing process of the current policies and procedures and case study of MacVille revealed that there are no sustainability policies and procedures within the business that directly link to a......

Words: 1106 - Pages: 5

Premium Essay

Project Plan

...[pic] Project Plan Template Document Control Document Information |© |Information | |Document Id |[Document Management System #] | |Document Owner |[Owner Name] | |Issue Date |[Date] | |Last Saved Date |[Date] | |File Name |[Name] | Document History |Version |Issue Date |Changes | |[1.0] |[Date] |[Section, Page(s) and Text Revised] | | | | | | | | | | | ...

Words: 1186 - Pages: 5

Free Essay

Requirement Template

...REQUIREMENTS COLLECTION Template A GUIDE FOR REQUIREMENTS GATHERING AND TRACE-ABILITY MATRIX DEVELOPMENT Revision: 1.0 About this document 3 Guidelines for using the Requirements Collection Template 4 Requirement ID: 4 Requirement Type 4 Parent Requirement#: 5 Source and source Document: 5 Dependencies: 5 Definitions of Priorities: 5 Tracking Requirements and status 6 Status Options: 6 Change History: 6 Clarification/specification of Requirement 6 Rationale: 6 Acceptance/Fit Criteria: 6 Dependencies: 6 The requirements collection template form 7 Requirements Traceability Matrix 8 About this document Requirements are the foundation of the project and the development of the product that the project has been organized to develop. The purpose of this document is to present a standardized requirements collection template. The template proposed in this document serves a variety of purposes. It is intended for all types of project requirements: • Business • User • System • Functional • Non-Functional The template is useful for the development of a traceability matrix because it tracks a requirement to its parent requirement, and requests the source and or document from which the requirement came. The template also supports specific, measureable, attainable, realistic and testable requirements by asking for supporting......

Words: 1161 - Pages: 5

Premium Essay

Prince2

...PRINCE2™- Business Case |Project Name: | | |Date: | |Release: |Draft/Final | |Author: | | |Owner: | | |Client: | | |Document Number: | | Note: This document is only valid on the day it was printed Revision History Date of next revision: |Revision Date |Previous Revision |Summary of Changes |Changes Marked| | |Date | | | | | | | | | | | | | | ...

Words: 829 - Pages: 4

Premium Essay

Plan

...[pic] Project Plan For [Project Name] Document Control Document Information |© |Information | |Document Id |[Document Management System #] | |Document Owner |[Owner Name] | |Issue Date |[Date] | |Last Saved Date |[Date] | |File Name |[Name] | Document History |Version |Issue Date |Changes | |[1.0] |[Date] |[Section, Page(s) and Text Revised] | | | | | | | | | | ...

Words: 1170 - Pages: 5

Premium Essay

Strategy Success in Gourmet Fast Food

...Individual Assessment Case study 1 Strategy success in gourmet fast food Contents Introduction ………………………………………………… ……….. 3 The Main Forces in the Macro-environment facing the Fast-food Industry ……………………………………………………………… 3 The Main Factors that contributed to Crust’s Success and to RBW’s Poor Performance ……………………………………….. 3 The most important marketing-mix elements in each firm and the impact of their marketing-mix focus have on their performance. ………………………………………………………………………… 4 Risk from the actions …………………………………………....... 6 Conclusion ………………………………………………………… 6 Reference …………………………………………………………. 7 2 Introduction An appropriate strategy like a compass, guides a right direction of the company, it describes the direction of a company want to go. (Pirraglia,W. 2014) But a successful marketing needs a useful strategy, and also a effective implementation. (Case study, Document) A Comparison of the two fast food companies Crust Gourmet Pizza Bars, an Australian company, and Real Burger World, a company in the United Kingdom. Both of them have a similar strategy and a same purpose: product a high quality food. However, during the execution, there are two different outcomes: Crust opened in 2001, and has grown to over 50 outlets from 2001 to 2010; RWB has gone out of business before a few years ago. (Case study, Documen The main forces in the macro-environment facing the fast-food industry The food intake of the people...

Words: 1297 - Pages: 6

Premium Essay

Test

...Life Cycle (STLC). The different stages in Software Test Life Cycle - Each of these stages have a definite Entry and Exit criteria  , Activities & Deliverables associat In an Ideal world you will not enter the next stage until the exit criteria for the previous stage practically this is not always possible. So for this tutorial , we will focus of activities and delive different stages in STLC. Lets look into them in detail. http://www.guru99.com/software­testing­life­cycle.html 1/12 6/28/2015 Software Testing Life Cycle STLC Requirement Analysis During this phase, test team studies the requirements from a testing point of view to identify requirements. The QA team may interact with various stakeholders (Client, Business Analyst, System Architects etc) to understand the requirements in detail. Requirements could be eith (defining what the software must do) or Non Functional (defining system performance /secur .Automation feasibility for the given testing project is also done in this stage. Activities Identify types of tests to be performed.  Gather details about testing priorities and focus. Prepare Requirement Traceability Matrix (RTM). Identify test environment details where testing is supposed to be carried out.  Automation feasibility analysis (if required). Deliverables RTM Automation feasibility report. (if applicable) Test Planning This phase is also called Test Strategy phase. Typically , in this stage, a Senior QA......

Words: 1712 - Pages: 7

Premium Essay

Internal

...Chapter V: Protection of assets and business and technology secret Article 17: Protection of assets * Assets include all things: machinery, tools, equipment, materials and spare parts, materials, waste, electricity, water, land, warehouses, security Cutting tools, documents, ... other things owned by company. * Employees have responsibility with use with the right purposes, keep and preserve the assets of company. Forbidden using the assets of company wastefully, carelessly, irresponsibly or stealing. * Any loss or damage the assets of company is caused by squandering, careless and irresponsibility or theft is disciplined. The employee is forced paying compensation and prosecuted in court in serious cases according to law. * The employee does not bring documents, books, specimens, supplies, machinery and equipment of the company out of the construction site, except with having the agreement of the Head of Department and announce to record tracking. * When there is no demand to use or when employee quits, the employee must be handed over the assets of company. Article 18: Awareness of thrift and anti-wastefulness * Absolutely do not use the telephone of company for personal purposes. In case, hearing the personal call by the telephone of company does not affect other important calls of company. Using the telephone for working must be reasonable, concise, and save enough to convey or handle work. * Only use the printer, copier, scanner, ... for......

Words: 718 - Pages: 3

Premium Essay

Syllabus

...------------------------------------------------- ENGLISH SKILLS FOR INTERNATIONAL BUSINESS COURSE SYLLABUS SEMESTER 3, 2013 INSTRUCTORS 1/ Ngo Thi Tuyet Mai (Assoc. Prof, Ph.D) Email: maingotuyet@yahoo.com Phone: 0904324282 2/ Tran Thi Thu Trang (M.A) Email: trang.tranthithu@gmail.com Phone: 0989886107 3/ Nguyen Bich Ngoc (PhD. Fellow) Email: bichngoc159@gmail.com Phone: 0919956929 CLASS HOURS: | 1-3, Monday, D2-203 | OFFICE: | Building 7, Room 307 & 310 | OFFICE HOURS: | Appointments are usually available | ------------------------------------------------- | | Course Description: This course is designed for International Business Management major who will ultimately be engaged in doing business internationally. In this course, students will learn the basis of writing business letters and the purpose of writing a business letter; draft a plan for the letter; write the letter; and edit the letter to ensure it fulfills your purpose. Particularly, an introduction to international business letter with some typical correspondence such as Enquiries, Replies and Quotations, Orders, Complaints and Adjustments will be delivered to the students. The course aims to document international standard banking practice for examination of commercial documents under the UCP 600, including a general overview of import – export, commercial documents, the principles of the UCP 600, the international standard banking practice to examine these......

Words: 987 - Pages: 4

Premium Essay

Theft and Concealment Investigation

...Theft and Concealment Investigation Case Study 1 1. Describe the stages and all aspects of coordinating an investigation in a manner that would not arouse the suspicions of Cummings and Baptiste. When it comes to investigating in a manner that will not arouse suspicions, there should be as few people involved as possible. People should not be wrongfully incriminated, especially when they are innocent. One word to avoid saying is “investigation”. Words like “audit” and “inquiry” should be used instead. The person suspected of the theft should not know about the investigation until they are interviewed. When the suspect is interviewed you should have sufficient evidence to have a powerful interview without giving away your case ahead of time. 2. Design a vulnerability chart to coordinate the various elements of the possible fraud. Case study 2 Based on your understanding of a fraud examiner's responsibilities regarding documents what should the audit firm personnel have done with their documents if they had suspected that fraud had occurred. Components of the fraud triangle, which are pressure, opportunity and justification, are similar to the fuel, spark and oxygen which together cause fire (Ozkul & Pamukcu, p. 22). These components come together when white-collar crimes are committed. Many people face pressures every day. Some people handle them better than others. If someone is a drug or alcohol addict or is a gambler or likes to go out to clubs......

Words: 528 - Pages: 3

Free Essay

Update Document Management

...UPDATES DOCUMENT MANAGEMENT (Indonesian Legal Perspective) Essay: Peri Farouk It's no secret, that provision requires the deposit of documents the company for 30 (thirty) years and limited storage medium only in the form of documents on paper records an economic and administrative burden is heavy for the business world. Judging from the storage period, the length of document storage will result in the incurrence of costs are doubled. First, in terms of space, the storage certainly require a large storage space, which eksrtemnya sometimes obviates the need for human resource space. Secondly, in terms of strength of materials, long-term storage of paper documents is certainly also need space with placement and special treatment to protect it from humidity, of the danger of flooding or fire, acts of irresponsible and others. Judging from storage, document mencatatatkan liability companies yant limited to paper media will cause anachronism. Ie the business world we will be left far from the development, where other countries and internationally has been so phenomenal transactions that use nonpaper media (paperlles transaction). And on the other side, namely in terms of the development of the law, that if we still cling to such anakkronisme, legal authority, especially in the aspect of the proof will decline, because the law in this case is not used as a tool set that something matters or problems that occur in society more easily in care or in the finish. In......

Words: 1224 - Pages: 5

Free Essay

Blaa

...is an inspection of taxpayer's business and / or individual books, records and documents. This inspection is to ensure the right amount of reported income and paid taxes required under laws and tax provisions. The investigation will be carried out only in cases where is suspected on the basis of precise and clear evidence that the tax payer is deliberately trying to avoid paying taxes or having committed an act of willful deceit under the Act, such as real property gains Tax Act ITA and 1976, the Petroleum(Income Tax) Act 1967, Promotion of Investment Act 1986, the Stamp Act 1949 and the Labuan Offshore Business Activity Tax Act 1990. There are two categories as follows: 1. Civil Tax Investigation Civil tax investigation activity involves detection of tax evasion. The primary concern being recovery of tax loss and imposition of heavy penalties. 2. Criminal Tax Investigation Functions and work procedures involving criminal tax investigation are similar to that of civil investigation. However with criminal investigation, it more focus on gathering admissible evidence with a view towards prosecution and conviction of the tax evader for commission of offences pursuant to ITA, Penal Code (Act 574), Criminal Procedure Code (Act 593), Evidence Act 1950 (Act 56) and other relevant Acts.(Hasil, 2007). How A Tax Investigation is carried out 1. The Visit Tax investigations conducted by the IRBM will be a surprise visits to taxpayer’s business premises, residential......

Words: 934 - Pages: 4

Premium Essay

Be Careful What You Sign

...It is only professional for someone engaging another into signing a contract to go on and make the lessee aware that they should go through the entire document before signing it and there hence tying themselves to all conditions of the agreement. It is the sole discretion of the lessee to read the whole document or not through before signing. In Letisha’s case, the lesser did not abide by this rule since he did not make Letisha aware of any other written pages contained in the contract document; instead he just asked her to sign at the bottom of the first page and did the same. 2. What legal arguments could be raised by Sudson in support of the enforcement of the automatic renewal clause against Letisha? Explain. * Sudson can argue that the lessee was feigning ignorance on her part and that is why she says that she was not aware of the contract terms. The lesser did engage the lessee in talking business and since she already is a businesswoman who engages others in written contracts as a landlord she should have known better than to sign a document that she had not read. Ignorance is not an excuse in law thus it was her prerogative as a businessperson to read the lease carefully even over a couple of days is she wanted before signing on the dotted line. Sudson is a business like any other and they engage in business deals that are favorable to them as an entity since they are out to make money and as such they should not be held accountable for the...

Words: 1358 - Pages: 6

Premium Essay

Joe Salitino

...specialists who work with financial information such as business records, bank statements, and tax returns for the purpose of finding valid data. This data is used to prepare their reports. The report is prepared in a manner that will be easily understood by the attorneys to use in research, negotiations or court proceedings. In the business world forensic accountants are used to help clarify and resolve a wide number of legal disputes, including shareholder disagreements, malpractice claims, insurance claims, business dissolutions, bankruptcy proceedings, and divorce proceedings, as well as fraud and embezzlement. ("Forensic accounting,") Determine the most important five (5) skills that a forensic accountant needs to possess and evaluate the need for each skill. Be sure to include discussion regarding the relationship between the skill and its application to business operations. Depending on the nature of the case, the skills necessary of the forensic accountant may vary. However, there are skills that all forensic accountants should have; • Oral communication skills- having the ability to effectively communicate and explain the findings of a case, especially in a courtroom environment is important. The FA should be able to disseminate information about company’s records and explain the importance of any interview they held with witnesses. The testimony of an FA must be able to convince the Judge in any court case. They are responsible to explain findings to a......

Words: 1709 - Pages: 7

Premium Essay

5. Consider the E-R Diagram in Figure 7-20. Based on This E-R Diagram, Answer the Following Questions: • A. How Many Employees Can Work on a Project? • B. What Is the Degree of the Used on Relationship? • C. Do Any

...in a new system. Requirements determination, requirements structuring, and alternative generation and selection are the three primary systems analysis activities. 2. What are some useful character traits for an analyst involved in requirements determination? Requirements determination is a crucial part of the systems development life cycle; therefore impertinence, impartiality, relaxing constraints, attention to details, and reframing are important characteristics. 3. Describe three traditional techniques for collecting information during analysis. When might one be better than another? Traditional techniques for collecting requirements include interviewing and listening, observing users, and analyzing procedures and other documents. Interviewing and listening involve talking with users individually or as a group to discover their views about the current and target systems; it also involves carefully preparing an interview outline and guide before conducting the interview. Interviews are best done when only a few people are involved, when you need open-ended questions or the questions vary from individual to individual, or when a more personal method is needed. 4. What are the general guidelines for conducting interviews? The general guidelines for conducting interviews are summarized in Table 5-3. These guidelines include planning the interview, being neutral, listening and taking notes, reviewing these notes within 48 hours, and seeking diverse views. ...

Words: 947 - Pages: 4