IBM: Building the IT Function for a Global Business
نویسندگان
چکیده
منابع مشابه
Building Better Business Cases for IT Investments
While most organizations today demand a robust business case justifying investments in information technology (IT), our research, which includes a survey of over 100 organizations, indicates that few organizations are satisfied with their ability produce such a case. In particular, they are concerned about identifying and quantifying the expected benefits. Surprisingly, many organizations don’t...
متن کاملStrategic Cost-Cutting in Information Technology: toward a Framework for Enhancing the Business Value of IT
The increasing dependency of many businesses with information technology (IT)and the high percentage of the IT investment in all invested capital in businessenvironment ask for more attention to this important driver of business. Thelimitation of capital budget forces the managers to look for more wise investment inIT. There are many cost-cutting techniques in the literature and each of them ha...
متن کاملClosing the Business-IT 'Gap': A Trust-Building Approach
This paper argues that inadequate levels of trust underlie the poor relationship between cross-functional groups, such as business and IT in organizations and suggests trust-building guidelines for tackling persisting issues of cross functional conflict to leverage organizations productivity and performance. The paper begins with re-interpreting existing literature on the business-IT ‘gap’ to h...
متن کاملIBM Global Services
Provides solid guidance for new and existing management structures Information technology (IT) and business, always closely intertwined, are now becoming virtually inseparable. While maintaining their traditional role of increasing organizational efficiency and effectiveness, IT departments are now often required to lead businesses into new industry structures and markets, most recently e-busin...
متن کاملBuilding the IBM 4758 Secure Coprocessor
W ork leading toward the IBM 4758 started, arguably, in the 1980s when the Abyss project began exploring techniques to build tamper-responsive hardware and use that technology to protect against software piracy. 1,2 Influenced by this earlier work, we sought to build a secure coprocessor, defined as a tamper-responding device derived from the Abyss, Citadel, and 4755 work. We wanted to provide ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2010
ISSN: 1556-5068
DOI: 10.2139/ssrn.1980332