This website uses technical, customisation and analytical cookies, both first-party and third-party, to anonymously facilitate browsing and analyse statistics on use of the website. Learn more
Search results
-
Radically Simple IT (Spanish version)
Upton, David M.; Staats, Bradley R.Article HBS-R0803JInformation Technologiesthe difficulty and expense of mapping out all requirements before a project starts because people often cannot specify everything that they need beforehand; the other unanticipated needs that almost always arise once a system is in operation; and the tricky task of persuading people to use and "own" it. Japan's Shinsei Bank emerged during the authors' research as a standout among the companies applying the path-based method. The firm designed, b...Starting at €8.20
-
Lean Knowledge Work
Staats, Bradley R.; Upton, David M.Article HBS-R1110G-EService and Operations ManagementMany manufacturing companies and some service firms have reaped considerable benefits by applying variations of the Toyota Production System, a method for making operations "lean" through relentless efforts to increase quality and efficiency and eliminate waste. But conventional wisdom holds that lean principles don't lend themselves to knowledge work, which involves judgment and expertise, not the sorts of repetitive, easily specified tasks foun...Starting at €8.20
-
The Danger from Within
Upton, David M.; Creese, SadieArticle HBS-R1409G-EStrategyThe 2013 cyberattack on Target is just one recent example of a growing phenomenon: attacks involving connected companies or direct employees. According to various estimates, at least 80 million of these attacks occur in the United States each year--but the number may be much higher, because they often go unreported. Upton and Creese head an international research project whose goal is to aid organizations in detecting and neutralizing threats fro...Starting at €8.20
-
Cybersecurity's Human Factor: Lessons from the Pentagon
Winnefeld, James A. Sandy; Kirchhoff, Christopher; Upton, David M.Article HBS-R1509G-EStrategyWith cyberattacks soaring, corporations must step up efforts to protect their IT networks. Most firms could learn from the U.S. military, which has been tightening its cyberdefenses for the past six years. In the past year alone, it adroitly repelled more than 30 million intrusions. A focus on reducing human error is core to the military's heightened security. As is true in the private sector, mistakes by administrators and users open the door to...Starting at €8.20
-
Radically Simple IT
Upton, David M.; Staats, Bradley R.Article HBS-R0803J-EInformation TechnologiesMany managers think that developing and rolling out a major IT system is like putting up a warehouse: You build it and you're done. But that does not work for IT anymore. Taking that approach results in rigid, costly systems that are outdated from the day they are turned on. What's needed for today's businesses is IT that serves not only as a platform for existing operations but also as a launchpad for new functions and businesses. In this articl...Starting at €8.20