Oracle Case Study

Improved Essays
Introduction
Oracle was founded in 1977 as Software Development Laboratories by Lawrence (Larry) Ellison, Bob Miner, and Ed Oates. Oracle Version 1 was written, but was never officially released. In 1979, Oracle Version 2 was release as the first commercial SQL relational database management system (RDBMS). Also in 1979, Software Development Laboratories changed its name to Relational Software Inc. (RSI). The 1980s was a busy decade for Oracle. In 1982, RSI was renamed Oracle Systems and hosted its first user conference in San Francisco, California. Oracle Version 3 was released in 1983, and was the first RDBMS to run on mainframes, microcomputers, and PCs, which allowed the software to be used in almost any enterprise environment. Oracle
…show more content…
Ellison as the Executive Chairman of the Board and Chief Technology Officer, Jeffrey O. Henley as the Vice Chairman of the Board, and Safra A Catz and Mark Hurd as the Chief Executive Officers, Oracle was founded in Santa Clara, California, but was relocated to Redwood Shores, California in 1989. Oracle offers many products and services, such as Oracle Cloud, Oracle Database, Engineered Systems, Java, Enterprise Management, to name a few. Oracle is traded on the NYSE under the code ORC. With a volume of 21,559,081 shares, the 52-week high is $46.71 and the 52-week low is $35.14. (Oracle Corporation, 2015) In the fourth quarter for fiscal year 2015, total revenues were down 5% to $10.7 billion, but would have been up 3% without the strengthening of the U.S. dollar. For fiscal year 2015, total revenues were unchanged at $38.2 billion, but up 4% in constant currency. (Oracle Corporation, 2015) Oracle’s top 3 competitors are International Business Machines Corporation (IBM), Microsoft Corporation, and SAP SE. (Hoovers, …show more content…
Oracle has many of the same cybersecurity requirements as any other corporation. Sensitive information of employees, customers, and the company itself must all be kept safe. This includes plans for upcoming acquisitions, programs that are being developed, and other trade secrets. Oracle’s network infrastructure must be kept save from attacks to allow the network to function properly. This can be accomplished by using firewalls, intrusion prevention/detection systems, strong encryption, and good security

Related Documents

  • Decent Essays

    It was brought to my attention that during last few weeks DBA group identified increased number of invalid accesses to the NextGen Production Repository. This is in violation of Allstate Oracle Security Standards, which state that end users must not use application user IDs to connect to a production database. I assume that attached security incidents were aligned with scheduled changes as part of a release, or to perform break-fix changes required in response to an incident. IMPORTANT!…

    • 121 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment

    • 1292 Words
    • 6 Pages

    In 2004 David extracted Ruby on Rails and officially released. It worked on three basic principles that include Ruby programming language, model-view-controller Architecture, and programmer Happiness over the years Rails have significant number of releases .for the bigneriens in web development Rails created ease for them. Its applications include Twitter and GitHub (Davies, 2004). 13.…

    • 1292 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    Data Confidentiality: When you keep important data it is important that the data doesn’t go out to the wrong hands. So if a business data is suddenly leaked online or maybe stolen, then this can result in a huge loss for the business and this can potentially put the business out of business. To overcome this problem, then you would need a good security program which can safeguard against any breach in confidentiality. Data Integrity: This is used to ensure that the most important data is secure and also makes sure that the data isn’t messed around with. If any of the data has been messed around with then this can result in major problems.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The Empire Hotel has a valid 5 year legacy Micros agreement that states that the Empire legacy services must be auto-renewed. Oracle is legally obligated to honor the legacy agreement, in order to convert the Empire Hotel to new Oracle parts, (10/04/2017) legal has sent out the 90 day termination letter allowing Oracle to terminate the prior legacy agreement. We now must auto-renew the current contract and the sales rep Brett will convert the customer to Oracle parts using the C2C process on the subsequent renewal.…

    • 86 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Salesforce. Com Case Study

    • 1319 Words
    • 6 Pages

    Resources and capabilities determines a firm's strategy thus, gaining the industry's KFS and leading the company to a competitive advantage. In Salesforces.com industry main KFSs are innovation, customer dedication, reliability, cost saving and customer relationship. Salesforce.com's way to reach its industry's KFSs has proven effective and its usage of internal resources and capabilities determined its success.…

    • 1319 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Capital Structure I will discuss the stock and capital structure of Oracle Corporation used to grow the corporation worldwide and strengthen research and development efforts. Corporations raise capital by issuing common and preferred stock, by exchanging an ownership stake and sharing profits with investors. The corporation experienced significant growth since the inception growing to over a $30B in recent years. Publicly traded corporations have risk associated with the stock price in relation to the market and investors use the beta in the capital asset pricing model to understand the risk of corporations. Stock Structure Public corporations organize shares under the stock structure that consists of common shares, preferred stocks, and restricted stocks.…

    • 865 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    And Oracle BPM Suite has been used for long time in this industry, it must has its own special and inreplaceable characteristics: Adjustable process development Further vision for a better business result Different BPM Apps for (web/mobile/email) for higher productivity Eliminating the lap between the system and the process, make the process more consecutive Improve productivity and efficiency of business process Automatization of processes to reduce the…

    • 753 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    However both Larry Page and Sergey Brin are the main bosses as they’ve become Alphabet’s new CEOs allowed Sundar Pichai to take the positon as CEO of Google. (Jay Yarlow (2015) Google Operating Structure ) In terms of its successes Google has bought up over 180…

    • 2422 Words
    • 10 Pages
    Great Essays
  • Great Essays

    Introduction International Business Machine (IBM) Corporation is one of the world’s largest multinational computer technology and IT consulting corporation. In 2011 it celebrated 100 years in age and $100 billion in sales. Interbrand rated IBM as the fourth value brand of the 2013 (2013 Best Global Brands, 2014). The company is proud of its contribution to the “ideas that shaped a century” (IBM, 2014).…

    • 1659 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Internal Security Threats

    • 1296 Words
    • 6 Pages

    This can open the flood gates for a serious internal attack. The second example of watching, managing, and protecting access is closely related to the protection…

    • 1296 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Everyday there are billions of conversations, billions of bytes of data being shared, billions of new files being created, and billions of computer processes running simultaneously. In between all those interactions exists the possibility of theft, fraud and espionage, all of which could be impossible to detect. While there are ways to prevent all possibilities of security breaches, none of those options are viable for organizations which rely heavily on being connected to various networks and having data continuously transferred throughout cyberspace. Instead, organizations focus on creating security systems that identify and contain breaches, still allowing for connectivity to the web. However, regardless of the complexity of a security…

    • 956 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction Object Oriented Programming is a programming language type modeled around using combinations of data structures, or objects, instead of actions and data instead of logic. These objects are modeled off both the state and behavior of real world objects. They can exchange information with one another or can be combined with each other into blocks. The objects also have procedures that can access and modify the data of the object they are in. The programs are designed for the objects to interact with each other.…

    • 764 Words
    • 4 Pages
    Improved Essays

Related Topics