Business Transformation Requires Transformational Leaders

Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans — you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.

Subscribe to Arthur D. Little's Culture & Leadership Newsletter

Insight

Is another ox going to get gored?

Just as the Internet (mainly Google) has proved a challenge for newspapers, the music and movie industry, and for parents of kids gaming and surfing online, the Internet may finally begin reshaping the last pieces of the book and publication distribution business.

Information security incidents and privacy breaches often result from risky behavior by personnel who are unaware that the way they are handling information is unsafe. A significant factor for this problem can be attributed to a lack of security policies, along with inadequate or nonexistent training and lack of awareness communications. According to a recent Cisco study [1]:

A spider is an eight-legged arachnid that has a head attached to a central body. Pull a leg off a spider and most can still walk, even if a little lopsided. Cut off the head, and the spider dies. Not so the starfish. While many people know that if you cut off a starfish's leg, it will grow back, most don't know that a starfish's major organs are replicated throughout its body.

From a certain perspective, enterprise resource planning (ERP) software architecture is just plain silly.

As the death toll has reached 1,000, there has been a lot of press coverage in the US this past week concerning the shortages in the availability of the swine flu vaccine. Planned vaccination clinics for the millions of high-risk individuals in the US, including pregnant mothers, children under the age of 10, and healthcare workers across the country, have been postponed en masse with no word on when they will be rescheduled.

Open source software (OSS) has been entering the enterprise almost invisibly for a number of years, initially in infrastructure as Web servers and replacement for proprietary Unix and then branching out into a diverse range of infrastructure components, embedded code, and applications. It has been invisible for a variety of reasons:

  • Many open source components initially introduced were highly technical and, therefore, beneath the radar of corporate executives.

In an outsourcing arrangement, many of the risks to personally identifiable information (PII) are the same as for internally processed information. Controlling the spread of PII within the outsourcer's IT environment is key, as is ensuring that access controls are effectively used, the outsourcers networks are secure, and encryption is used in association with organizational sensitive data and PII. Even administrative controls, such as employee background checks, have applicability in an outsourcing arrangement.

Enterprise 3.0 is about trends -- and outcomes. It's about radical changes that, taken together, move us away from silly debates about business technology "alignment" and closer to business technology convergence.