You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Outsourcing is now increasingly used as a competitive weapon in today's global economy. 'The Outsourcing Handbook' is a guide to the whole process. It looks at key factors in the success of a project as well as problem areas and potential pitfalls.
Outsourcing is now increasingly used as a competitive weapon in today's global economy. The Outsourcing Handbook is a step-by-step guide to the whole outsourcing process. It describes each stage or phase of strategic outsourcing, and looks at key factors in the success of a project as well as problem areas and potential pitfalls. Highly practical, it provides an objective, repeatable process that allows organizations to maximize returns on outsourcing investments. Unlike most outsourcing books, it takes a process-oriented, actionable, and structured approach to understanding the intricacies of constructing, managing, and even terminating, an outsourcing engagement.
On February 1st 2003, one of the worst and most public disasters ever witnessed in the human space programme unfolded with horrifying suddenness in the skies above north central Texas. The Space Shuttle Columbia – the world’s first truly reusable manned spacecraft – was lost during her return to Earth, along with a crew of seven. It was an event that, after the loss of Space Shuttle Challenger during a launch 17 years before, the world had hoped it would never see again. This book details each of Columbia’s 28 missions in turn, as told by scientists and researchers who developed and supported her many payloads, by the engineers who worked on her and by the astronauts who flew her. In doing so, it is intended to provide a fitting tribute to this most remarkable flying machine and those who perished on her last mission.
Managing Knowledge Security is a comprehensive reference detailing how to secure both the physical and intangible assets owned by a business. Citing international examples such as Hewlett Packard, Microsoft, Google, Boeing and Amazon, the author covers all aspects of knowledge protection from employee retention strategies, to physical security and how to deal with crises. The book stresses the importance of taking measures to retain key assets and to avoid data and knowledge falling into the hands of competitors. It also offers practical strategies based on the author's experience of working in the field. The concluding chapter summarizes the lessons learned.
This seminal work presents an effective design for processing information through five stages from data to actionable knowledge in order to influence behavior within organizations. The authors incorporate such concepts as evolution, semiotics, entropy, complexity, emergence, crisis, and chaos theory in an intriguing alternative to crisis management that can be applied to any organization. Their model shows how to evaluate and share information to enable the organization to avoid disaster rather than simply respond to it. Additionally, the text presents the first attempt at a multi-disciplinary view of information processing in organizations by tying associated disciplines to their respective impacts on the information process. Illustrations used in the text include an overlay that demonstrates how the non-use of information between agencies contributed to the 9/11 disaster, and an appendix addresses Organizing for Cyberterrorism.
The politics of higher education -- College and the myth of the good job -- Why higher education reduces social mobility -- The myth of the fair meritocracy -- How college changed childhood, education, and parenting in America -- Training undemocratic capitalists -- The death of the liberal classroom -- Will technology and the free market save higher ed and the job market? -- Conclusion : educating equality