HBSP (USA)
-
La retirada audaz
Adner, Ron; Snow, Daniel C.Article HBS-R1003EInformation TechnologiesUna nueva tecnología superior emerge en el horizonte, amenazando su negocio existente. ¿Se esfuerza por hacer una transición sin problemas al mismo o, tal vez, intenta luchar y derrotarlo? Ambas respuestas pueden perder estrategias. Una tercera frecuencia superior, opción, es una de "retiro negrita", con lo cual sus cedes empresa más de mercados establecida a la nueva tecnología, dominante y en lugar perseguir el posiciones menos vulnerables - no...Starting at €8.20
-
Beware of Old Technologies' Last Gasps
Snow, Daniel C.Article HBS-F0801B-EInformation TechnologiesWhen a new technology appears, the old one experiences a sudden leap in performance. Whether you are an old- or a new-technology company, understanding how that phenomenon works can help you win during this critical transition period.Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1013-EInformation TechnologiesIn 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new, previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws in order to patch and fix insecure so...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1014-EInformation TechnologiesThis epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws...Starting at €8.20
-
Bold Retreat: A New Strategy for Old Technologies
Adner, Ron; Snow, Daniel C.Article HBS-R1003E-EInformation TechnologiesA superior new technology emerges on the horizon, threatening your existing business. Do you strive to make a seamless transition to it or, perhaps, try to fight and defeat it? Both of those responses can be losing strategies. A third, frequently superior, option is one of "bold retreat," whereby your company cedes most of the established market to the new, dominant technology and instead pursues less vulnerable positions - not as a "turn tail an...Starting at €8.20
-
Computerized Provider Order Entry at Emory Healthcare
Hamermesh, Richard G.; McFarlan, F. Warren; Morgan, Michael; Keil, Mark; Katz, Andrew; LaBorde, DavidCase HBS-311061-EInformation TechnologiesThe Computerized Provider Order Entry at Emory Healthcare case presents one hospital system's efforts to implement computerized provider order entry (CPOE) across all of its hospitals and the challenges they faced in doing so. Issues such as standardizatiStarting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy, Teaching Note
Narayanamurti, Venkatesh; Ellis, RyanTeaching Note HBS-KS1120-EInformation TechnologiesTeaching note for KS1013.Starting at €0.00