Analysis UBER's strategy.
1. Define the problem UBER has tried to solve. (from both supplier and consumer's points of view)
2. Transportation industry(Taxi) before UBER
3. How UBER business actually works
4. Their international strategy
5. Five forces analysis
6. Challenges and suggestions
These slides use concepts from my (Jeff Funk) course entitled Biz Models for Hi-Tech Products to analyze the business model for Uber’s taxi service. Uber’s service enables anyone to provide taxi services and it provides dynamic pricing for better matching of supply and demand. Its value proposition for potential drivers is the opportunity to work as driver on their own hours. Its value proposition for user to lower taxi fares during most times of the day and a higher supply of taxis (and higher prices) during peak demand. The customers are tech-savvy and smart phone users who value their time. Uber receives payments directly from customers and keeps a percentage of these payments as its income. Uber’s patents for a demand-price algorithm represent a barrier of entry and thus a method of strategic control.
Analysis UBER's strategy.
1. Define the problem UBER has tried to solve. (from both supplier and consumer's points of view)
2. Transportation industry(Taxi) before UBER
3. How UBER business actually works
4. Their international strategy
5. Five forces analysis
6. Challenges and suggestions
These slides use concepts from my (Jeff Funk) course entitled Biz Models for Hi-Tech Products to analyze the business model for Uber’s taxi service. Uber’s service enables anyone to provide taxi services and it provides dynamic pricing for better matching of supply and demand. Its value proposition for potential drivers is the opportunity to work as driver on their own hours. Its value proposition for user to lower taxi fares during most times of the day and a higher supply of taxis (and higher prices) during peak demand. The customers are tech-savvy and smart phone users who value their time. Uber receives payments directly from customers and keeps a percentage of these payments as its income. Uber’s patents for a demand-price algorithm represent a barrier of entry and thus a method of strategic control.
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
Presented at the Saskatchewan Access, Privacy, Security and Records Management Forum 2012, in June 2012.
This is a modified version, since I am not including the videos online.
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
APNIC Senior Security Specialist Adli Wahid spoke on the importance and role of CERTs in helping prevent cyber attacks at the Philippines Cybersecurity Conference 2021, held online from 13 to 29 October 2021.
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...Amazon Web Services
"In this session, learn how Trend Micro built Deep Security as a service on AWS. This service offers enterprise-grade security controls for AWS deployments in the form of intrusion detection and prevention, anti-malware, a firewall, web reputation, and integrity monitoring.
With over 400 internal requirements set by their in-house Information Security and IT Operations teams, the Service team was challenged with building the case to deploy Deep Security as a service on AWS instead of in-house. This session walks through the reasons why the team chose AWS, the design decisions they made, and how they were able to meet or exceed their in-house requirements while deploying on AWS."
Maybe you can already recite the sales pitch for cloud computing in your sleep—how it’s faster, more flexible, and economical than amassing your own servers on site. But, as Joe Weinman argues in “Rethinking the Business Benefits of Cloud,” that’s just scratching the surface.
In these slides, Joe Weinman, author of Cloudonomics: The Business Value of Cloud Computing, explores some of the overlooked—and more nuanced—business benefits of moving workloads to the cloud, such as faster innovation, global expansion, and customer satisfaction.
What is the difference between a hacking attack and a cyberwar attack? What do current militaries consider an attack vs. exploitation or just «normal operations»? Kevin will present an overview on the cyber warfare topic and the current understanding of Advanced Persistent Threats in the context of cyber defense.
Referent: Kevin Kirst
In football, special teams - the groups that do field goals, kick-offs, etc. - don't spend a ton of time on the field. But they routinely win (or lose) games. For this reason, even though special teams is a part-time job for many of the players, they are nonetheless thoroughly conditioned, trained, briefed, and otherwise prepared for this crucial role.
Incident response (IR) teams serve a similar function for enterprise IT organizations. Many team members don't work full-time on IR. Yet when they are needed, the stakes couldn't be higher for the IT department. As such, it is absolutely crucial that the IR team is on top of its game.
This webinar will review the factors driving the ascendence of IR as the next crucial discipline for IT in general and the CIO / CSO in particular. It will then highlight the crucial components of an effective IR capability with particular emphasis on what leading organizations are doing to upgrade their IR function.
Our featured speakers for this timely webinar will be:
-Andrew Jaquith, Chief Technology Officer & SVP Cloud Strategy, SilverSky
-Ted Julian, Chief Markting Officer, Co3 Systems
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker H...David Etue
Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174)
Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control we’ve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.
Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Los...EC-Council
Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control we’ve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.
Dr. Jeff Daniels and Dr. Ben Amaba discuss performance without limits 2.0 with a special focus on emerging research in industrial control systems, cybersecurity, cloud computing, and the pervasiveness of mobile devices.
This talk was given at the Winspear Opera House in Dallas, Texas.
Houston Interactive Marketing Association - Multiscreen Attribution with Vide...Thomas Ciszek
Unfortunately, I had accidentally deleted many awesome multi-screen slides without making a backup just before giving my presentation which included a video crowdfunding case study. Lesson: Make a backup. Nonetheless, HiMA was a great learning experience!
Structure 2014 - The strategic value of the cloud - Joe WeinmanGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The strategic value of the cloud
Joe Weinman, Author, Cloudonomics
Chairman, IEEE Intercloud Testbed Executive Committee
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Structure 2014 - The right and wrong way to scale - RackspaceGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The right and wrong way to scale
Taylor Rhodes, CEO, Rackspace
#gigaomlive
More at http://events.gigaom.com/structure-2014/
More Related Content
Similar to IS CLOUD COMPUTING A TECHNOLOGY, AN OPERATIONS MODEL OR A BUSINESS STRATEGY from Structure:Europe 2013
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
Presented at the Saskatchewan Access, Privacy, Security and Records Management Forum 2012, in June 2012.
This is a modified version, since I am not including the videos online.
Philippines Cybersecurity Conference 2021: The role of CERTsAPNIC
APNIC Senior Security Specialist Adli Wahid spoke on the importance and role of CERTs in helping prevent cyber attacks at the Philippines Cybersecurity Conference 2021, held online from 13 to 29 October 2021.
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...Amazon Web Services
"In this session, learn how Trend Micro built Deep Security as a service on AWS. This service offers enterprise-grade security controls for AWS deployments in the form of intrusion detection and prevention, anti-malware, a firewall, web reputation, and integrity monitoring.
With over 400 internal requirements set by their in-house Information Security and IT Operations teams, the Service team was challenged with building the case to deploy Deep Security as a service on AWS instead of in-house. This session walks through the reasons why the team chose AWS, the design decisions they made, and how they were able to meet or exceed their in-house requirements while deploying on AWS."
Maybe you can already recite the sales pitch for cloud computing in your sleep—how it’s faster, more flexible, and economical than amassing your own servers on site. But, as Joe Weinman argues in “Rethinking the Business Benefits of Cloud,” that’s just scratching the surface.
In these slides, Joe Weinman, author of Cloudonomics: The Business Value of Cloud Computing, explores some of the overlooked—and more nuanced—business benefits of moving workloads to the cloud, such as faster innovation, global expansion, and customer satisfaction.
What is the difference between a hacking attack and a cyberwar attack? What do current militaries consider an attack vs. exploitation or just «normal operations»? Kevin will present an overview on the cyber warfare topic and the current understanding of Advanced Persistent Threats in the context of cyber defense.
Referent: Kevin Kirst
In football, special teams - the groups that do field goals, kick-offs, etc. - don't spend a ton of time on the field. But they routinely win (or lose) games. For this reason, even though special teams is a part-time job for many of the players, they are nonetheless thoroughly conditioned, trained, briefed, and otherwise prepared for this crucial role.
Incident response (IR) teams serve a similar function for enterprise IT organizations. Many team members don't work full-time on IR. Yet when they are needed, the stakes couldn't be higher for the IT department. As such, it is absolutely crucial that the IR team is on top of its game.
This webinar will review the factors driving the ascendence of IR as the next crucial discipline for IT in general and the CIO / CSO in particular. It will then highlight the crucial components of an effective IR capability with particular emphasis on what leading organizations are doing to upgrade their IR function.
Our featured speakers for this timely webinar will be:
-Andrew Jaquith, Chief Technology Officer & SVP Cloud Strategy, SilverSky
-Ted Julian, Chief Markting Officer, Co3 Systems
Control Quotient: Adaptive Strategies For Gracefully Losing Control (Hacker H...David Etue
Control Quotient: Adaptive Strategies For Gracefully Losing Control as presented at Hacker Halted 2014 on October 17, 2014 (https://www.hackerhalted.com/2014/us/?page_id=1174)
Abstract: Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control we’ve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.
Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Los...EC-Council
Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control we’ve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments.
Dr. Jeff Daniels and Dr. Ben Amaba discuss performance without limits 2.0 with a special focus on emerging research in industrial control systems, cybersecurity, cloud computing, and the pervasiveness of mobile devices.
This talk was given at the Winspear Opera House in Dallas, Texas.
Houston Interactive Marketing Association - Multiscreen Attribution with Vide...Thomas Ciszek
Unfortunately, I had accidentally deleted many awesome multi-screen slides without making a backup just before giving my presentation which included a video crowdfunding case study. Lesson: Make a backup. Nonetheless, HiMA was a great learning experience!
Similar to IS CLOUD COMPUTING A TECHNOLOGY, AN OPERATIONS MODEL OR A BUSINESS STRATEGY from Structure:Europe 2013 (20)
Structure 2014 - The strategic value of the cloud - Joe WeinmanGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The strategic value of the cloud
Joe Weinman, Author, Cloudonomics
Chairman, IEEE Intercloud Testbed Executive Committee
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Structure 2014 - The right and wrong way to scale - RackspaceGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The right and wrong way to scale
Taylor Rhodes, CEO, Rackspace
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Structure 2014 - The future of cloud computing survey resultsGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
The future of cloud computing survey results
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Gigaom's Structure 2014 conference, June 21-22 in San Francisco Launchpad company profiles
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
Intel sponsor workshop: Disrupting the data center
#gigaomlive
More at http://events.gigaom.com/structure-2014/
Presentation from Gigaom's Structure 2014 conference, June 21-22 in San Francisco
Quantifying the iot
Craig Labovitz, Co-Founder and CEO, DeepField
#gigaomlive
More at http://events.gigaom.com/structure-2014/
25 Favorite Experiences in Tech - from Roadmap 2013Gigaom
Presentation from
Shoshana Berger, IDEO
Josh Brewer, Twitter
Ryan Freitas, about.me
Julie Horvath, GitHub
Braden Kowitz, Google Ventures
#roadmap2013
More at http://events.gigaom.com/roadmap-2013/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
2. IS CLOUD COMPUTING A TECHNOLOGY, AN OPERATIONS MODEL
OR A BUSINESS STRATEGY?
SPEAKER: Joe Weinman
SVP
Cloud Services and Strategy
Telx
Tuesday, October 1, 13
3. Is Cloud Computing a Technology,
an Operations Model, or a Business
Strategy?
Joe Weinman
SVP, Cloud Services and Strategy, Telx
jweinman@telx.com
@joeweinman
Tuesday, October 1, 13
4. NIST Definition of Cloud
oud computing is a model for enabling convenient, on-demand network access to a share
sources (e.g., networks, servers, storage, applications, and services) that can be rapidly p
inimal management effort or service provider interaction.
On-demand self-service: A consumer can unilaterally provision computing capabilities, su
orage, as needed automatically without requiring human interaction with each service’s p
Broad network access: Capabilities are available over the network and accessed through s
se by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs
Resource pooling: The provider’s computing resources are pooled to serve multiple consu
th different physical and virtual resources dynamically assigned and reassigned accordin
nse of location independence in that the customer generally has no control or knowledge
ovided resources but may be able to specify location at a higher level of abstraction (e.g.
amples of resources include storage, processing, memory, network bandwidth, and virtua
Rapid elasticity: Capabilities can be rapidly and elastically provisioned, in some cases aut
pidly released to quickly scale in. To the consumer, the capabilities available for provisio
nd can be purchased in any quantity at any time.
Measured Service: Cloud systems automatically control and optimize resource use by leve
vel of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth,
sage can be monitored, controlled, and reported providing transparency for both the prov
rvice.Tuesday, October 1, 13
24. Creative Destruction
Destruction Creation
Edited Print Encyclopedia Crowdsourced Wikipedia
Telco SMS Over the Top WhatsApp
Circuit-Switched Voice Skype, Google Voice
Matchmakers Match.com
Film Photography Digital / Instagram
Books eBooks
CDs iTunes / Pandora / Spotify
Waving Down Cabs Uber
Cash Registers Square
Based in Part on Mary Meeker/KPCB, “Internet Trends,” D10 Conference, May 30, 2012
Tuesday, October 1, 13
25. Range of IT Value
Source: Joe Weinman, Cloudonomics
Tactical
Tuesday, October 1, 13
26. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Operational
Tactical
Tuesday, October 1, 13
27. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Strategic
Operational
Tactical
Tuesday, October 1, 13
28. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Existential
Strategic
Operational
Tactical
Tuesday, October 1, 13
29. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Existential
Strategic
Operational
Tactical
•Base Functionality
Tuesday, October 1, 13
30. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Existential
Strategic
Operational
Tactical
•Base Functionality
•Total Cost
Tuesday, October 1, 13
31. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
Existential
Strategic
Operational
Tactical
•Base Functionality
•Business Agility
•Total Cost
Tuesday, October 1, 13
32. Range of IT ValueIncreasingValue
Source: Joe Weinman, Cloudonomics
•Firm Survival
Existential
Strategic
Operational
Tactical
•Base Functionality
•Top Line Revenue/Growth
•Market Share
•Customer Churn
•Core vs. Context
•User Experience
•Business Agility
•Total Cost
Tuesday, October 1, 13
33. IT and the Cloud Do Matter
Tuesday, October 1, 13
34. IT and the Cloud Do Matter
Increasingly Digital World
Tuesday, October 1, 13
35. IT and the Cloud Do Matter
Increasingly Digital World
IT/Cloud Imperative
Tuesday, October 1, 13
36. IT and the Cloud Do Matter
Increasingly Digital World
IT/Cloud Imperative
Strategic & Existential
Tuesday, October 1, 13
37. IT and the Cloud Do Matter
Increasingly Digital World
IT/Cloud Imperative
Strategic & Existential
Focused Investment
Tuesday, October 1, 13
38. Decision Making
Source: Brynjolfsson, Hitt, and Kim, “Strength in Numbers:
How Does Data-Driven Decisonmaking Affect Firm Performance?,” 2011
Tuesday, October 1, 13
39. Decision Making
“Data-driven decision
making” correlates
with higher
productivity, market
value, ROE, and asset
utilization.
Source: Brynjolfsson, Hitt, and Kim, “Strength in Numbers:
How Does Data-Driven Decisonmaking Affect Firm Performance?,” 2011
Tuesday, October 1, 13
40. Firm Profitability
Fixed Effect Models*
Base Model Incl Sales, OPEX
IT 1.912 1.837
Sales 0.054
OPEX 0.137
Advertising 0.155 0.142
R&D 1.001 0.993
R2 (overall) 0.49 0.51
Observations 276276
Number of Firms 8686
Source: Sunil Mithas, Ali Tafti, Indranil Bardhan, Jie Mein Goh, “Information Technology and Firm Profitablilty,” MIS
Quarterly, March 2012. Used by Permission (*includes intercept, year, industry average Tobin’s q. Herfindahl Index, and
industry capital intensity.”
Tuesday, October 1, 13
41. Value Disciplines
Source: Michael Treacy & Fred Wiersema, “The Discipline of Market Leaders;”Joe Weinman, Cloudonomics
Tuesday, October 1, 13
43. Value Disciplines
Operational Excellence Product Leadership
Source: Michael Treacy & Fred Wiersema, “The Discipline of Market Leaders;”Joe Weinman, Cloudonomics
Tuesday, October 1, 13
44. Value Disciplines
Operational Excellence Product Leadership
Customer Intimacy
Source: Michael Treacy & Fred Wiersema, “The Discipline of Market Leaders;”Joe Weinman, Cloudonomics
Tuesday, October 1, 13
45. Value Disciplines
Operational Excellence Product Leadership
Customer Intimacy Accelerated Innovation
Source: Michael Treacy & Fred Wiersema, “The Discipline of Market Leaders;”Joe Weinman, Cloudonomics
Tuesday, October 1, 13
58. Organizational Designs
Source: After Nadler, Gerstein, Shaw, Organizational Architecture
Hierarchical
Bureaucracy
Simple
EnvironmentalComplexity
Tuesday, October 1, 13
59. Organizational Designs
Source: After Nadler, Gerstein, Shaw, Organizational Architecture
Hierarchical
Bureaucracy
Simple
Entrepreneuri
al
EnvironmentalComplexity
Pace of Change
Tuesday, October 1, 13
60. Organizational Designs
Source: After Nadler, Gerstein, Shaw, Organizational Architecture
Hierarchical
Bureaucracy
Network
Simple
Entrepreneuri
al
EnvironmentalComplexity
Pace of Change
Tuesday, October 1, 13