Filter Results:
(227)
Show Results For
- All HBS Web (467)
- Faculty Publications (87)
Show Results For
- All HBS Web (467)
- Faculty Publications (87)
Page 1 of 227
Results →
Sort by
- December 1987 (Revised January 1988)
- Background Note
Managing Information Technology: Telecommunications and Computer Networks
Applegate, Lynda M. "Managing Information Technology: Telecommunications and Computer Networks." Harvard Business School Background Note 188-033, December 1987. (Revised January 1988.)
- March 1992 (Revised December 1992)
- Case
Mips Computer Systems (A)
Describes the strategy and performance of Mips Computer Systems, focusing on the company's use of a global network of alliances to promote its RISC standard. Addresses how various networks (consortia) of firms are competing in this field. Examines networking... View Details
Gomes-Casseres, Benjamin. "Mips Computer Systems (A)." Harvard Business School Case 792-055, March 1992. (Revised December 1992.)
- 30 Jun 2003
- Research & Ideas
Computer Security is For Managers, Too
company computer systems is often left unclear. Managers need to ask, "Who should have remote access to the corporate network? What safeguards must be in place before employees can connect to the corporate View Details
- 2010
- Article
Competing against Online Sharing
By: Ramon Casadesus-Masanell and Andres Hervas-Drane
This paper aims to explore online sharing of copyrighted content over peer-to-peer (p2p) file sharing networks and its impact on the music industry and to assess the viable business models for the industry in the future. View Details
Keywords: Consumers; Computer Networks; Resource Sharing; Online Operations; Internet and the Web; Copyright; Networks; Business Model; Music Industry
Casadesus-Masanell, Ramon, and Andres Hervas-Drane. "Competing against Online Sharing." Management Decision 48, no. 8 (2010): 1247–1260.
- February 2008 (Revised August 2008)
- Case
Quanta Computer and the One Laptop Per Child Initiative
By: Willy Shih, Chintay Shih and Jyun-Chen Wang
When Quanta Computer, Inc., the world's largest manufacturer of laptop computers, first joined the One Laptop Per Child (OLPC) initiative, it faced a challenge trying to balance the cost objectives of a laptop computer targeted at children of the developing world with... View Details
Keywords: For-Profit Firms; Disruptive Innovation; Demand and Consumers; Supply Chain; Partners and Partnerships; Nonprofit Organizations; Hardware
Shih, Willy, Chintay Shih, and Jyun-Chen Wang. "Quanta Computer and the One Laptop Per Child Initiative." Harvard Business School Case 608-102, February 2008. (Revised August 2008.)
- August 1998 (Revised May 1999)
- Case
Network Computer, Inc.
By: Lynda M. Applegate and Kirk A. Goldman
Keywords: Information Infrastructure; Networks; Corporate Strategy; Information Technology; Internet and the Web; Computer Industry
Applegate, Lynda M., and Kirk A. Goldman. "Network Computer, Inc." Harvard Business School Case 399-026, August 1998. (Revised May 1999.)
- July 1989 (Revised April 1996)
- Case
AUCNET: TV Auction Network System
The AUCNET system links buyers and sellers in the wholesale used car market in Japan. Video images delivered via videodisk or satellite along with an inspector's opinion and objective character based data are used to conduct a realtime auction over computers and... View Details
Keywords: Information Technology; Market Entry and Exit; Auctions; Service Industry; Japan; United States
Konsynski, Benn R. "AUCNET: TV Auction Network System." Harvard Business School Case 190-001, July 1989. (Revised April 1996.)
- 2007
- Working Paper
Bandwidth Allocation in Peer-to-Peer Filesharing Networks
By: Albert Creus-Mir, Ramon Casadesus-Masanell and Andres Hervas-Drane
We present a model of bandwidth allocation in a stylized peer-to-peer file sharing network with s peers (sharers) who share files and download from each other and f peers (freeriders) who download from sharers but do not contribute files. Assuming that upload bandwidth... View Details
- 08 Jul 2024
- Research & Ideas
The Critical Computer Science Principles Every Strategic Leader Needs to Know
network effects allow platforms to grow exponentially, attracting ever more users and partners and eventually crowding out competitors. 3. Think like a sandwich From the computer keyboard and user interface... View Details
- 07 Sep 2016
- What Do You Think?
How Can the Threat of Networks Be Reduced?
SUMMING UP Are Computers and Tech-Driven Networks In Their Twilight Years? Issues raised by the ascendancy of network technology are many and varied, judging from responses to... View Details
Keywords: by James Heskett
- December 1999
- Case
Sun Microsystems, Inc. (A3): Network Computer: Robert Gianni on Answering the Skeptics
By: Rosabeth M. Kanter and Jane Roessner
The concept behind the network computer (NC) at Sun Microsystems, Inc. was simple: bringing workstation performance to the desktop. Recent technological breakthroughs and changes in the marketplace made the NC project timely. But internal and external skeptics wondered... View Details
- 2007
- Other Unpublished Work
Mind Over Matter? Similarities and Differences Between Perceived and Observed Networks
In spite of the rapid development of new methods for network analysis—relying on electronic data sources and sophisticated computational analysis—organizational scholars continue to rely largely on more traditional survey-based methods. We believe that the... View Details
- December 1999
- Case
Sun Microsystems, Inc. (A2): Network Visions: Mike Clary on the Product that Hid in HR
By: Rosabeth M. Kanter and Jane Roessner
Chief scientist Bill Joy of Sun Microsystems, Inc. had a vision for a new product called "Jini": a network computing piece of infrastructure that would reinforce Sun's leadership role in the industry for helping define how the Internet and networking technology... View Details
- 21 Mar 2019
- Working Paper Summaries
Advancing Computational Biology and Bioinformatics Research Through Open Innovation Competitions
- June 2003
- Case
Rise and Fall (?) of Palm Computing in Handheld Operating Systems,The
Describes the evolution of the handheld operating system market. Describes the rise to dominance of Palm's operating system and the significant challenge to that dominance posed by Microsoft's Windows CE. View Details
Keywords: Competition; Information Infrastructure; Applications and Software; Network Effects; Computer Industry; Computer Industry
Corts, Kenneth S., and Deborah Freier. "Rise and Fall (?) of Palm Computing in Handheld Operating Systems,The." Harvard Business School Case 703-519, June 2003.
- November–December 2012
- Article
Toward a Theory of Extended Contact: The Incentives and Opportunities for Bridging Across Network Communities
By: Maxim Sytch, Adam Tatarynowicz and Ranjay Gulati
This study investigates the determinants of bridging ties within networks of interconnected firms. Bridging ties are defined as nonredundant connections between firms located in different network communities. We highlight how firms can enter into these relationships... View Details
Sytch, Maxim, Adam Tatarynowicz, and Ranjay Gulati. "Toward a Theory of Extended Contact: The Incentives and Opportunities for Bridging Across Network Communities." Organization Science 23, no. 6 (November–December 2012): 1658–1681.
- Article
Applying KISS to Healthcare Information Technology
By: Regina E. Herzlinger, Margo Seltzer and Mark Gaynor
Current public and private healthcare information technology initiatives have failed to achieve secure integration among providers. Applying the "keep it simple, stupid" principle offers the key guidance for solving this problem. View Details
Keywords: Technology; Health Care; Public Health; Information Technology Industry; Computer Networks; Computer Services Industries; Software; Hardware; Medical Services; Health Care and Treatment; Information Technology; Applications and Software; Information Infrastructure; Standards; Health Industry; Technology Industry; United States
Herzlinger, Regina E., Margo Seltzer, and Mark Gaynor. "Applying KISS to Healthcare Information Technology." Computer 46, no. 11 (November 2013): 72–74.
- 2019
- Working Paper
From Know-It-Alls to Learn-It-Alls: Executive Development in the Era of Self-Refining Algorithms, Collaborative Filtering and Wearable Computing
By: Mihnea Moldoveanu and Das Narayandas
We examine the future of executive education on a technological and cultural landscape that is imminent but different to the one we are accustomed to. We show how the contextualization, socialization and personalization of learning—avowed but distal goals of current... View Details
Keywords: Executive Education; Leadership Development; Technological Innovation; Customization and Personalization; Management Skills; Knowledge Acquisition; Knowledge Sharing
Moldoveanu, Mihnea, and Das Narayandas. "From Know-It-Alls to Learn-It-Alls: Executive Development in the Era of Self-Refining Algorithms, Collaborative Filtering and Wearable Computing." Harvard Business School Working Paper, No. 20-061, November 2019.
- 2021
- Working Paper
First Law of Motion: Influencer Video Advertising on TikTok
By: Jeremy Yang, Juanjuan Zhang and Yuhan Zhang
This paper engineers an intuitive feature that is predictive of the causal effect of influencer video advertising on product sales. We propose the concept of m-score, a summary statistic that captures the extent to which a product is advertised in the most engaging... View Details
Keywords: Influencer Advertising; Video Advertising; Computer Vision; Machine Learning; Advertising; Online Technology
Yang, Jeremy, Juanjuan Zhang, and Yuhan Zhang. "First Law of Motion: Influencer Video Advertising on TikTok." Working Paper, March 2021.
- Article
Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error
By: Celia Cintas, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan and Edward McFowland III
Reliably detecting attacks in a given set of inputs is of high practical relevance because of the vulnerability of neural networks to adversarial examples. These altered inputs create a security risk in applications with real-world consequences, such as self-driving... View Details
Keywords: Autoencoder Networks; Pattern Detection; Subset Scanning; Computer Vision; Statistical Methods And Machine Learning; Machine Learning; Deep Learning; Data Mining; Big Data; Large-scale Systems; Mathematical Methods; Analytics and Data Science
Cintas, Celia, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan, and Edward McFowland III. "Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error." Proceedings of the International Joint Conference on Artificial Intelligence 29th (2020).