Oracle: Partners with specialisations are much more successful
- 26 June, 2012 19:59
Oracle's partner community had a "phenomenal" fiscal 2012, but those who achieved official specialisations did far better than ones who didn't, according to a top Oracle executive.
Specialized partners closed three times as many deals as non-specialized ones, and those transactions are 50 percent larger, said Judson Althoff, senior vice president of worldwide alliances, channels and embedded sales. Althoff revealed those details during Oracle's fiscal 2013 partner kickoff event, which was webcast.
"We're focusing on specialization because we think it makes you sell better," Althoff said. Of course, Oracle also generates revenue from specializations, which are offered in silver, gold, platinum and diamond tiers, with fees rising accordingly.
Oracle has also certified 30,000 additional implementation consultants in the past year, nearly doubling its base to almost 60,000, according to Althoff. The company wants that number to get even higher, and also hopes systems integrators can "wrapper" Oracle's technology into "repeatable offerings" that can be sold again and again, he added.
Last year, Oracle spelled out a partner strategy that would see its own internal sales team focus on the company's largest accounts, with partners urged to tackle the broader market.
That plan hasn't changed for Oracle's fiscal 2013, Althoff said. "Our strategy is to be consistent."
Oracle got into the hardware business with the acquisition of Sun Microsystems, a deal that closed in early 2010. It has been rolling out a series of specialized "engineered systems" that combine its hardware and software. These include the Exadata database machine and Exalogic application server.
The company has tried to get ISV (independent software vendor) partners on board with this one-stop-shop mindset through the Exastack certification program, which was launched in June 2011. Under the program, ISVs certify their products for Exadata, Exalogic and the accompanying stack of software they run, which includes Oracle's database, WebLogic application server and Unbreakable Linux.
Exastack has two levels, Ready and Optimized. Within the past year, 100 ISV applications have gained Ready status, and another 35 have reached the Optimized level, Oracle announced Tuesday.
Partners will now also be able to gain Exastack Optimized certification for the SPARC SuperCluster T4-4, Oracle said.
Another big consideration for partners is how they'll adapt to Oracle's emerging cloud computing strategy, which includes its new Fusion Applications delivered as SaaS from data centers powered by Exadata and Exalogic.
It took Oracle seven years to develop and release Fusion Applications, which will also be available on-premises using the same codebase. Many large systems integrators have developed practices around Fusion Applications implementations.
Right now, about 200 customers are running Fusion Applications, said executive vice president of product development Thomas Kurian in a prepared presentation during the webcast. "A number" of these customers "are live," he said, presumably meaning in full production, while "many more will go live this summer."
Some have gone from buying the software to going live in as little as 18 days, while others have done so in two or three months, Kurian said.
Right now, Oracle is offering Fusion HCM (human capital management), recruiting, sales, marketing and customer service, with ERP (enterprise resource planning) and supply chain coming soon, he said.
Oracle plans to support and assist systems integrators who currently specialize in one of Oracle's previously available business application lines, such as E-Business Suite and PeopleSoft, said Michelle Hallett, vice president, Oracle Diamond alliances, worldwide alliances and channels.
"All of your foundational skills with Oracle are going to be relevant whether you deploy in the cloud, on-premises or a combination of the two," she said.
"It's about evolving your practice," Althoff said. "We're investing heavily in applications that enable customer choice."
"You're going to evolve with us to capture this opportunity and we've set up a system to allow you to do so," he added. "Moving to the cloud will be easier with us than with any other platform."
Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris's e-mail address is Chris_Kanaracus@idg.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.
Building a Better Mousetrap in Anti-Malware
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.