Clayton Christensen’s Disruptive Prescription for Healthcare

Professor Clayton Christensen
Professor Clayton Christensen

Harvard Business School Professor Clayton Christensen has developed a model that explains the market chaos that follows a game-changing innovation in any particular field.  Using examples from the steel, computing, chemistry, and financial industries, he explains the three enablers that make an innovation game-changing: technology, a cost-effective business model, and a “complete vertical commercial system.”

Where’s the biggest opportunity for business?  Healthcare, according to Professor Christensen.  “We are now just desperate to make healthcare affordable and accessible, and healthcare is something that everybody consumes…I just can’t think of another industry that has those kind of characteristics.  Demand is robust.  [It’s] a great opportunity for disruption.” Says Professor Christensen.

Click here to learn how the model works, and how to benefit from the biggest opportunity in business today.

Melissa Hathaway Moves to Harvard

Melissa Hathaway
Melissa Hathaway

Melissa Hathaway has accepted a post at Harvard University’s Belfer Center for Science and International Affairs.  She will serve as a senior adviser to its cybersecurity initiative, Project Minerva.  Melissa Hathaway previously worked for Presidents George W. Bush and Barack Obama until August 2009, when she left to establish Hathaway Global Strategies, LLC.  She led President Obama’s 60-Day Cyberspace Policy Review from February-May 2009.

Project Minerva is a joint effort between the Department of Defense, Massachusetts Institute of Technology, and Harvard University, and examines a wide range of the issues within cyber security from the contexts of international relations theory and practice.   Melissa Hathaway said of her latest venture, “I am honored to be joining the team at Harvard Kennedy School’s Belfer Center and my distinguished colleagues from Harvard and MIT on the Minerva project. I am excited about the opportunity to partner with the talent and expertise of academia and harness academia’s power to generate new ideas, inform policy and incubate new technologies to address the serious cyber security challenges facing our nation.”

Phishing Scam Compromises Email Accounts

The other day, Microsoft confirmed that a number of Hotmail account login information was compromised and posted online. It now appears that the breach is significantly wider, extending to Gmail, AOL, Yahoo, Earthlink and Comcast email accounts.

Over 30,000 accounts have been posted online according to a list the BBC viewed. Google has moved to mitigate the threat by forcing users to alter their login credentials. Google also claimed that the breach was not a result of security issues with Gmail. Instead, it was based on a phishing scam in which victims voluntarily gave login information to the scammers. Microsoft has also moved to block the compromised accounts. The various account information was posted in two different lists that have subsequently been removed.

Senator Claire McCaskill (D-MO) On DCAA Oversight

Check out the video on

You may also be interested in...


Army Taps Charles River Analytics for Trauma Care Algorithm

Charles River Analytics has received almost $1 million in funds from the U.S. Army to develop an agent-based algorithm that could provide teams of robotic and human caregivers with direction and assistance in treating traumatic injuries.

U.S. Army

Army Names Six Companies to Bid for Orders Under $76M Design-Build Contract

The U.S. Army has selected six companies to design, build, sustain, modernize and restore military and civilian facilities under a $76M multiple-award contract. The construction companies will compete for task orders under the firm-fixed-price contract and work to complete duties by Jan. 21, 2026, the Department of Defense said Friday.


CISA Seeks Market Info on Incident Mgmt Tracking System

The Cybersecurity and Infrastructure Security Agency wants to identify market sources of a system that would help operators track incident management activities.

CISA said Friday in a SAM notice its threat hunting unit needs an incident management work tracking system with an encryption level of at least 140-2 in an effort to enhance the security of information technology enterprise of the federal government.