Business Transformation Requires Transformational Leaders

Leadership and teaming skills are front and center in times of rapid change. Meet today’s constant disruption head on with expert guidance in leadership, business strategy, transformation, and innovation. Whether the disruption du jour is a digitally-driven upending of traditional business models, the pandemic-driven end to business as usual, or the change-driven challenge of staffing that meets your transformation plans — you’ll be prepared with cutting edge techniques and expert knowledge that enable strategic leadership.

Subscribe to Arthur D. Little's Culture & Leadership Newsletter

Insight

Abstract

Barriers to the continual refinement of today's traditional search engine model are looming as the Internet continues to grow exponentially, as the information signal-to-noise ratio continues to shrink, and as we embrace the emerging Web 3.0 era, which is characterized by semantically linked data.

I've been thinking quite a bit about the word "static" and how it might be used to describe some aspects of the Information Age in which we live. Static is an interesting word, having more than one meaning when used in different contexts.

Abstract

Open source software (OSS) is becoming increasingly important within the enterprise as it moves out from its original base within the IT infrastructure and server environment.

Open source software (OSS) entered the enterprise gradually and almost invisibly, generally with Linux in technical and infrastructure areas frequently buried in the IT department and below the corporate radar. However, open source has grown in importance and gained a retinue of powerful supporters such as IBM, HP, and Novell.

Abstract

This Executive Report outlines the framework and process of business transformation.

The accompanying Executive Report discusses the framework, process, and practical enactment of business transformation. The report is based on the unique experiences I've had providing consulting and training services to three separate organizations over the past two years.

Enterprise data integrity, security, and confidentiality have long relied on combined network- and application-based security. When data was secured on local centralized systems using role-based account access supported by strong firewalls, the thinking was that corporate data was well secured.

The September issue of the Cutter Benchmark Review (CBR) focuses on IT governance. In this Business-IT Strategies E-Mail Advisor, we examine current practices and the relationship of governance to IT's value. For example, we examine whether IT governance contributes to the value IT delivers.