Information Technology To Transform A Term Paper

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now?

After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either through fresh issue of shares or depend on Venture Capital -- VC funding. In case his project is a runaway success, he will definitely get more doses of VC funding, however any failure will ruin him. He has to use a number of channel partners like sales forces, territory wise, and websites to sell the software to various customers. (DeHayes, 2003)

6. Prepare the presentation Tim should make to the board.

A i) Ladies and Gentlemen, I take this opportunity to present before you our breakthrough product the Virtual Analyzer that consists of six major modules-each serving a unique area of problem faced by customer in realm of TEM. Slides containing the brief features of the modules are shown. As you are aware, the market size is huge. According to Gartner-Dataquest estimates, the addressable telecom cost management is poised to rise from a little under $2 billion presently to more than $5 billion by the year 2005 which translates to a CAGR of 26%. The market is fragmented with virtually no dominant player and hence there is tremendous scope for growth. In case our company is able to corner just 5% of that market, it will translate into a massive sales opportunity. We can grow to the revenue target of $100 million which I have fixed to reach in a timeframe of 7 years. Besides, cost management is just one aspect of the functions which Virtual Analyzer -- VA will provide our clients. (DeHayes, 2003) ii) a continuous income stream as an Application Service Provider -- ASP is assured because of the annuity value. While we wish the client to use the VA modules as a single package, customers can pick and choose among various services but he must at least subscribe to the Client Information Management and Vendor Invoice Processing and Vendor Invoice Payment modules so...

...

To be more specific, Ladies and Gentlemen, the price will be based on the size of the company and the quantity of modules they select to use. Bigger companies making use of modules would be billed about 2% of their monthly telecom cost whereas smaller companies using all the modules would be levied close to 6% of their monthly telecom cost. (DeHayes, 2003)
Hence it is my expectation that our average customer revenue to be nearly $25.000 monthly which approximately 4% of their average monthly telecom bill. At this juncture, it will be realistic to disclose that our project will take the remaining part of this year, the entire next year and will be ready for alpha and beta testing by initial part of the year 2001. Therefore we will be able to earn any revenue from VA after 2002 onwards. Therefore any revenue till that period will come from maintaining our old business model. It is my anticipation that the net investment to achieve this change is going to cost us more than $9 million spread out over 1999 through 2001. Moreover, we have to take into account extra costs for improvements between $1 million and $3 million every year onwards. But I consider that we will be able to record revenue target coming from this new business model. It is my hunch that generating $100 million revenue with almost $50 million in EBITDA is practicable achievable. Looking at the size of the market, we require a miniscule proportion of the $5 billion market to hit the 2006 target revenue. It will really be demanding for a $7 million company to spend more than million. Hence we will have to raise that much of money as we at Teletron do not generate that amount of money. Thank you all. (DeHayes, 2003)

Reference

Auditel Inc. (2003) "Telecom Expense Management Training -Phase III" Retrieved 4 May, 2007 at http://www.auditelinc.com/Telecommunications_Training_Phase_III.aspx

Bennett, Elizabeth. (2006, Aug) "Taming the Wireless Beast." Baseline. Retrieved 4 May, 2007 at http://www.rivermine.com/articles/Baseline_Sodexho_article.pdf

Cass Information Systems Inc. (2007) "Telecom Expense…

Sources Used in Documents:

Reference

Auditel Inc. (2003) "Telecom Expense Management Training -Phase III" Retrieved 4 May, 2007 at http://www.auditelinc.com/Telecommunications_Training_Phase_III.aspx

Bennett, Elizabeth. (2006, Aug) "Taming the Wireless Beast." Baseline. Retrieved 4 May, 2007 at http://www.rivermine.com/articles/Baseline_Sodexho_article.pdf

Cass Information Systems Inc. (2007) "Telecom Expense Mgt" Retrieved 4 May, 2007 at http://www.cassinfo.com/casstelecom/expensemgmt.html

DeHayes, Daniel W. (2003) "Teletron, Inc.: Using Information Technology to transform a company" Case Study.


Cite this Document:

"Information Technology To Transform A" (2007, May 06) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-to-transform-a-37897

"Information Technology To Transform A" 06 May 2007. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-to-transform-a-37897>

"Information Technology To Transform A", 06 May 2007, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-to-transform-a-37897

Related Documents

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

Information Technology Today business world is changing rapidly. The cause of this is globalization, high IT investment and technological change in relationship with high cost of research and development (Frishamar, 2004). The function of information technology has become important part of how companies manage and control their resources, different companies and organizations respond to technology in different ways (Johnson, 2007). IT plays a significant role in modern business especially in looking

However, a complex project might need a higher level of expertise that not only requires project management skills but also experience with technology. What are the pros and cons of the following statement? If the Internet is to flourish, the creators of the information on our information superhighway must be protected. Intellectual property rights must be respected. If First Amendment rights are used as a justification for violating property rights, the