PeopleSoft sees the departure of another exec

Within two weeks of the firing of chief executive officer Craig Conway, business applications supplier PeopleSoft has seen the...

This Article Covers


Within two weeks of the firing of chief executive officer Craig Conway, business applications supplier PeopleSoft has seen the departure of another top executive, Ram Gupta, senior vice-president of products and technology.

Company spokesman Steve Swasey confirmed Gupta's exit but declined to add any details, leaving it unclear whether Gupta was fired or left voluntarily.

"We don't discuss the departure of employees and personal employee business," Swasey said.

Gupta was largely seen as the executive in charge of the consolidation of the PeopleSoft applications portfolio with those of JD Edwards, which PeopleSoft acquired last year.

|n the summer, Gupta said that among PeopleSoft's postmerger achievements was the ability to provide customers with "more choice" in products.

In addition to reviving development of the World product line, Gupta claimed that in one year, PeopleSoft rolled out more enhancements to the EnterpriseOne suite, the former JD Edwards flagship application, than had been added in the two years before the merger.

Replacing Gupta is longtime PeopleSoft veteran Stan Swete, who worked for PeopleSoft between 1992 and 2002 and was one of "the principal architects of PeopleSoft 8", according to Swasey.

Swete's return to the company demonstrates chief executive Dave Duffield's commitment "to re-energise PeopleSoft's innovation and technology development," Swasey added.

Marc L Songini writes for Computerworld



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT jobs and recruitment

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...