HBSP (USA)
-
Radically Simple IT (Spanish version)
Upton, David M.; Staats, Bradley R.Article HBS-R0803JInformation Technologiesthe difficulty and expense of mapping out all requirements before a project starts because people often cannot specify everything that they need beforehand; the other unanticipated needs that almost always arise once a system is in operation; and the tricky task of persuading people to use and "own" it. Japan's Shinsei Bank emerged during the authors' research as a standout among the companies applying the path-based method. The firm designed, b...Starting at €8.20
-
Implementing ERP (Spanish version)
Austin, Robert D.; Nolan, Richard L.; Cotteleer, MarkCase HBS-608S31Information TechnologiesReviews Cisco System's approach to implementing Oracle's Enterprise Resource Planning (ERP) software product. This case chronologically reviews the diverse, critical success factors and obstacles facing Cisco during its implementation. Cisco faced the need for information systems replacement based on its significant growth potential and its reliance on failing legacy systems. The discussion focuses on where management was particularly savvy in co...Starting at €8.20
-
Enterprise Software Selection (Spanish version)
Austin, Robert D.; Sole, Deborah; Cotteleer, MarkCase HBS-606S14Information TechnologiesDescribes Harley-Davidson's decision process for defining and selecting an enterprise-wide procurement software package and the institutional changes introduced as part of this process. Tells the story of Harley-Davidson's approach in developing integrated business processes and information systems to meet the needs of a visionary procurement strategy. Central to this activity was the evaluation and selection of an enterprise software package and...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1013-EInformation TechnologiesIn 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new, previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws in order to patch and fix insecure so...Starting at €8.20
-
Harley-Davidson Motor Co.: Enterprise Software Selection
Austin, Robert D.; Sole, Deborah; Cotteleer, MarkCase HBS-600006-EInformation TechnologiesDescribes Harley-Davidson's decision process for defining and selecting an enterprise-wide procurement software package and the institutional changes introduced as part of this process. Tells the story of Harley-Davidson's approach in developing integrated business processes and information systems to meet the needs of a visionary procurement strategy. Central to this activity was the evaluation and selection of an enterprise software package and...Starting at €8.20
-
Cisco Systems, Inc.: Implementing ERP
Austin, Robert D.; Nolan, Richard L.; Cotteleer, MarkCase HBS-699022-EInformation TechnologiesReviews Cisco System's approach to implementing Oracle's Enterprise Resource Planning (ERP) software product. This case chronologically reviews the diverse, critical success factors and obstacles facing Cisco during its implementation. Cisco faced the need for information systems replacement based on its significant growth potential and its reliance on failing legacy systems. The discussion focuses on where management was particularly savvy in co...Starting at €8.20
-
Radically Simple IT
Upton, David M.; Staats, Bradley R.Article HBS-R0803J-EInformation TechnologiesMany managers think that developing and rolling out a major IT system is like putting up a warehouse: You build it and you're done. But that does not work for IT anymore. Taking that approach results in rigid, costly systems that are outdated from the day they are turned on. What's needed for today's businesses is IT that serves not only as a platform for existing operations but also as a launchpad for new functions and businesses. In this articl...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1014-EInformation TechnologiesThis epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws...Starting at €8.20
-
Codelco Copper Mines (Spanish version)
Upton, David M.; Staats, Bradley R.; Fuller, Virginia A.Case HBS-610S13Information TechnologiesCodelco era una empresa minera de cobre chilena, ampliamente considerado como una de las firmas más administrados profesionalmente en América del Sur, a pesar del hecho de que era propiedad del Gobierno 100%. Una empresa de $ 10.5 mil millones en 2005, Codelco enfrenta al reto de la incorporación de tecnología de la información en sus procesos de producción, los cuales habían sido históricamente muy Manual en la naturaleza. los intentos de respue...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy, Teaching Note
Narayanamurti, Venkatesh; Ellis, RyanTeaching Note HBS-KS1120-EInformation TechnologiesTeaching note for KS1013.Starting at €0.00