No one is allowed to enter the building without proper authorization; all incoming e-mail messages are filtered; personal computers that are used to store sensitive data do not have a direct connection to the internet, and therefore cannot be accessed remotely. With these enterprise security rules, we have ensured that our private information is safe, right? Wrong!
Enterprise Architecture Software
In an earlier blog post, we introduced the Business Model Canvas (Osterwalder, 2009) as a useful tool for describing how a business captures, creates and delivers value. In this blog, we will elaborate on Business Models, introducing the subject of Business Model Analysis. We will present several possible analytical techniques, using the case of Nextpresso, a virtual coffee-cup company.