Category: Digital Terrorism (Page 15 of 70)

United Technologies Case Discussion

Credit: forbes.com

In mid-2000, United Technologies Corporation (UTC) was two years into a supplier development integration program. The major focus of this initiative was to strengthen relationships with “key” suppliers to fully leverage the supply chain. The qualities sought in the relationships included long-term commitments, confidential information sharing, cooperative continuous improvement efforts, and sharing risks and rewards. Both the nature of these relationships and the associated behaviors were new for UTC and represented a significant challenge.

Continue reading

The Choreography of a Traditional Ballet

Credit: liveabout.com

Describe the choreography of a traditional ballet. How do the dancers hold their bodies – what is their posture like overall? What is it like when they jump or leap, and how do they land back on the stage? What kinds of lines do they make with their arms/legs? When the dancers perform as a group, what is that like? How do these things differ or remain the same in the Rite of Spring?

Continue reading
« Older posts Newer posts »

© 2024 Blog

Theme by Anders NorenUp ↑