Published on 24 Jul 2012
“ The Rational HATS software allowed us to take our existing green screen applications, and with Royal Cyber’s consulting help, modernize those so that we can have key features that our competitors also have. ”
Kermit Lewis, director business solutions/IT, Gulistan Carpet
Royal Cyber Inc.
Gulistan Carpet is a premium manufacturer of fine medium to high-end carpets since 1924. The company has more than 380 employees and operates facilities in Aberdeen, North Carolina. Gulistan Carpet supplies its merchandise to big box stores, distributors and dealers in the United States and Canada.
In an increasingly competitive marketplace, Gulistan Carpet wanted to create a more modern, dynamic, flexible customer portal that would enable it to stay ahead of the competition.
Gulistan Carpet worked with IBM Business Partner® Royal Cyber Inc. to use the logic of the company’s existing applications to create a more intuitive and full-featured customer portal.
Usage of the portal, which enables customers to enter orders and get timely information via the web, increased by 50 percent just one month after it was launched.
IBM products and services that were used in this case study.
Rational Application Developer, Rational Host Access Transformation Services, Rational Host On-Demand, WebSphere Application Server
© Copyright IBM Corporation 2012 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America June 2012 IBM, the IBM logo, ibm.com, and Rational are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The performance data and client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. It is the user’s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS Word documentUMENT IS PROVIDED “AS IS” WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that systems and products are immune from the malicious or illegal conduct of any party. RAC14261-USEN-00