Business Transformation Requires Transformational Leaders
Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans — you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.
Subscribe to Arthur D. Little's Culture & Leadership Newsletter
Insight
The End of the Internet Static Age: Desperately Seeking Search 3.0
Barriers to the continual refinement of today's traditional search engine model are looming as the Internet continues to grow exponentially, as the information signal-to-noise ratio continues to shrink, and as we embrace the emerging Web 3.0 era, which is characterized by semantically linked data.
The End of the Internet Static Age: Desperately Seeking Search 3.0
Open Source Governance Within the Enterprise
Open source software (OSS) is becoming increasingly important within the enterprise as it moves out from its original base within the IT infrastructure and server environment.
Open Source Governance Within the Enterprise
Open source software (OSS) entered the enterprise gradually and almost invisibly, generally with Linux in technical and infrastructure areas frequently buried in the IT department and below the corporate radar. However, open source has grown in importance and gained a retinue of powerful supporters such as IBM, HP, and Novell.
The Business Transformation Process
The Business Transformation Process
The accompanying Executive Report discusses the framework, process, and practical enactment of business transformation. The report is based on the unique experiences I've had providing consulting and training services to three separate organizations over the past two years.
Data Security Implications for New Enterprise Architectures
Enterprise data integrity, security, and confidentiality have long relied on combined network- and application-based security. When data was secured on local centralized systems using role-based account access supported by strong firewalls, the thinking was that corporate data was well secured.
The September issue of the Cutter Benchmark Review (CBR) focuses on IT governance. In this Business-IT Strategies E-Mail Advisor, we examine current practices and the relationship of governance to IT's value. For example, we examine whether IT governance contributes to the value IT delivers.

