Sourcing Lecture 4 Shared Services Collaboration And CrowdsourcingFrank Willems
This is lecture 4 from 5 about three types of sourcing; shared services, collaboration and crowdsourcing. Specially the crowsourcing will be an revolutionair way of sourcing.
Sourcing Lecture 4 Shared Services Collaboration And CrowdsourcingFrank Willems
This is lecture 4 from 5 about three types of sourcing; shared services, collaboration and crowdsourcing. Specially the crowsourcing will be an revolutionair way of sourcing.
Speaker: Allam Ahmed, SPRU
Presentation at the Eldis 20th Anniversary event "Learning from 20 years of digital knowledge sharing for global development" held at IDS on Thursday 15 September 2016 and Friday 16 September 2016.
You can watch a video of this presentation at:
https://youtu.be/ncIVJFLBXZ8
A connected enterprise transformation through mobility and social networksIJMIT JOURNAL
Due to rapid changes in business dynamics, there is a growing demand to encourage social
conversations/exchanges and the ability to connect and communicate with peers, partners, customers and
other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise
applications.
Business Networking and Performance of Small and Medium Scale Enterprises in ...Dr. Amarjeet Singh
The impact of business networking on the performance of SMEs in Benue State, Nigeria is investigated in this study. The study focuses on the impact of network governance, network content, and network structure on SMEs in Benue State, Nigeria. The study employs a survey design, with a questionnaire serving as the data gathering tool. The study's population consists of 650 licenced SMEs in Benue State, with a sample size of 242 obtained via stratified sampling. The KMO and Bartlett's tests show that variables are highly significant, and principal component analysis was appropriate at 0.631. The reliability test-retest result revealed a reliability index of (0.702). Regression analysis was used to examine and present the data received from the businesses surveyed. Network governance (42.2 percent), network content (30.2 percent), and network structure (46.2 percent) all have a positive and significant effect on the performance of SMEs in Benue State, Nigeria, according to the results of tested hypotheses. According to the study's findings, business networking in a business environment is concerned with characteristics such as network governance, network content, and network structure, which create the foundation upon which SMEs connect with their surroundings. The research also revealed that business networking has a significant impact on SMEs' performance. SMEs working in any business environment should build up a formation structure that allows them to engage freely within the environment, according to the report.
Driving Social Business Transformation with The Microsoft Platform - Symon Ga...SPC Adriatics
Recent research by MIT Sloan Management shows that 70% of CEO’s believe that Social Business will important to their organisation within three years, and that many believe that social business offers opportunities to transform their organisations. But many organisations are being held back due to a lack of strategy, no clear business case or value proposition and competing priorities. Industry analysts Gartner estimates that 80% of social business efforts will fail.
This session will define clearly define social business, show how to align social business initiatives with competitive strategy and present a framework for social business transformation using Microsoft technologies including SharePoint, Office365, Yammer and Dynamics CRM. Based on a blend of consulting expertise, real world stories and on-going doctoral research we go beyond sound bites, rhetoric, and anecdotes and deliver practical guidance grounded in management science and experience that will enable you to complete your successful social business transformation.
Brunswick Future of Stakeholder Engagement Report February 2013Brunswick Group
Conventional wisdom holds that “Stakeholder Engagement” is important and organisations should be doing it.But there’s very little data available about what “it” is, or about the benefits and risks organisations see from engaging in new ways with groups they may not have dealt with in the past.
The purpose of this survey was to explore what stakeholder engagement looks like with those who are closest to the front line: senior European communicators at large corporations, government bodies, NGOs, associations and other organisations.
Presentation 1: Web 2.0 - Leading Applications in Government
Presenters:
Eric Bristow - Senior Manager, Deloitte Consulting
Doug Shoupp – Principal, Deloitte Consulting
Information Systems, Organizations and Strategy - Management Information SystemFaHaD .H. NooR
How information systems impact organizations and business firms:
Economic Impacts
Organizational and Behavioural Impacts
The Internet and Organizations
Implications for the Design and Understanding of IS’s
Cognitive Integration: How Canonical Models and Controlled Vocabulary Enable ...Cognizant
For pharmaceuticals companies dealing with multiple partners' systems, employing a canonical model for data communications facilitates point-to-point integration, and applying a controlled vocabulary (CV) in such models alleviates semantical ambiguity and facilitates cognitive and systems integration. We demonstrate how this works with a pharma business scenario involving Contract Research Organizations (CROs).
Speaker: Allam Ahmed, SPRU
Presentation at the Eldis 20th Anniversary event "Learning from 20 years of digital knowledge sharing for global development" held at IDS on Thursday 15 September 2016 and Friday 16 September 2016.
You can watch a video of this presentation at:
https://youtu.be/ncIVJFLBXZ8
A connected enterprise transformation through mobility and social networksIJMIT JOURNAL
Due to rapid changes in business dynamics, there is a growing demand to encourage social
conversations/exchanges and the ability to connect and communicate with peers, partners, customers and
other stakeholders anytime, anywhere which drives the need of mobile-enable, the existing enterprise
applications.
Business Networking and Performance of Small and Medium Scale Enterprises in ...Dr. Amarjeet Singh
The impact of business networking on the performance of SMEs in Benue State, Nigeria is investigated in this study. The study focuses on the impact of network governance, network content, and network structure on SMEs in Benue State, Nigeria. The study employs a survey design, with a questionnaire serving as the data gathering tool. The study's population consists of 650 licenced SMEs in Benue State, with a sample size of 242 obtained via stratified sampling. The KMO and Bartlett's tests show that variables are highly significant, and principal component analysis was appropriate at 0.631. The reliability test-retest result revealed a reliability index of (0.702). Regression analysis was used to examine and present the data received from the businesses surveyed. Network governance (42.2 percent), network content (30.2 percent), and network structure (46.2 percent) all have a positive and significant effect on the performance of SMEs in Benue State, Nigeria, according to the results of tested hypotheses. According to the study's findings, business networking in a business environment is concerned with characteristics such as network governance, network content, and network structure, which create the foundation upon which SMEs connect with their surroundings. The research also revealed that business networking has a significant impact on SMEs' performance. SMEs working in any business environment should build up a formation structure that allows them to engage freely within the environment, according to the report.
Driving Social Business Transformation with The Microsoft Platform - Symon Ga...SPC Adriatics
Recent research by MIT Sloan Management shows that 70% of CEO’s believe that Social Business will important to their organisation within three years, and that many believe that social business offers opportunities to transform their organisations. But many organisations are being held back due to a lack of strategy, no clear business case or value proposition and competing priorities. Industry analysts Gartner estimates that 80% of social business efforts will fail.
This session will define clearly define social business, show how to align social business initiatives with competitive strategy and present a framework for social business transformation using Microsoft technologies including SharePoint, Office365, Yammer and Dynamics CRM. Based on a blend of consulting expertise, real world stories and on-going doctoral research we go beyond sound bites, rhetoric, and anecdotes and deliver practical guidance grounded in management science and experience that will enable you to complete your successful social business transformation.
Brunswick Future of Stakeholder Engagement Report February 2013Brunswick Group
Conventional wisdom holds that “Stakeholder Engagement” is important and organisations should be doing it.But there’s very little data available about what “it” is, or about the benefits and risks organisations see from engaging in new ways with groups they may not have dealt with in the past.
The purpose of this survey was to explore what stakeholder engagement looks like with those who are closest to the front line: senior European communicators at large corporations, government bodies, NGOs, associations and other organisations.
Presentation 1: Web 2.0 - Leading Applications in Government
Presenters:
Eric Bristow - Senior Manager, Deloitte Consulting
Doug Shoupp – Principal, Deloitte Consulting
Information Systems, Organizations and Strategy - Management Information SystemFaHaD .H. NooR
How information systems impact organizations and business firms:
Economic Impacts
Organizational and Behavioural Impacts
The Internet and Organizations
Implications for the Design and Understanding of IS’s
Cognitive Integration: How Canonical Models and Controlled Vocabulary Enable ...Cognizant
For pharmaceuticals companies dealing with multiple partners' systems, employing a canonical model for data communications facilitates point-to-point integration, and applying a controlled vocabulary (CV) in such models alleviates semantical ambiguity and facilitates cognitive and systems integration. We demonstrate how this works with a pharma business scenario involving Contract Research Organizations (CROs).
Value chain innovation - Breaking the chainsJurjen Helmus
Innovation in the value chain enables companies to change their business radicall. Particularly businesses that are currently in not-beneficial value systems could be able to innovate out of their position. Breaking the Chains is a presentation about innovating in the value system.
The presentation consists of three parts
1 Value chain thinking
2 Value systems with issues
3 Breaking the chains of value eco systems
Social Business Innovation & Legacy SystemsJane Young
A journey through the legacy systems that destroy value in our organisations - from email overload and endless meetings, to fear culture and wheel reinvention.
IB Business and Management (Standard Level)
All material taken from the IB Business and Management Textbook:
"Business and Management", Paul Hoang, IBID Press, Victoria, 2007
A quick intro to the Build, Buy, Acquire decision for Digital Product Managers.
Presentation excerpt from Udemy course "Digital Product Management" http://udemy.com/digital-product-management
Framework for Evaluating Enterprise Software CompaniesShomik Ghosh
I have given this talk to a variety of large tech companies and investors. The goal is to educate others around qualitative aspects of enterprise software investing and how you can use these insights to determine the quality of the company.
Abstract
The shift from transformation activities to interactions represents a broad shift in the
nature of economic activity. Enterprises looking to succeed in today’s rapid-paced new
economy must be agile, innovative and rapidly responsive to changes in their business
environment.
The number of employees doing interactive and cognitive work is increasing rapidly.
Supporting knowledge workers becomes of vital importance for the ability of enterprises
to survive in a networked knowledge economy. By regarding knowledge as a production
factor and by supporting knowledge workers, enterprises can achieve great breakthroughs
in quality, productivity and impact. The emphasis in this vision is placed on “being able
to use knowledge” instead of “having knowledge”.
Traditional capabilities and enablers are not sufficient to meet the challenges of an
enterprise environment that isshifting from push driven to pull driven. It requires inter
alia an agile infrastructure. To support the business transformation there is need for
Enterprise architecture that deals not only with technical capabilities, but also with
information and knowledge, organizational and process capabilities. Knowledge
‘architecture’ is the most forgotten discipline within enterprise architecture. Today we
model and design everything (data, processes,organizations etc.) but not knowledge. To
combat the shrinking half-life of knowledge, organizations are forced to develop new
methods of establishing and managing knowledgeprocesses, authentic sources and their
owners. This transformation should be embedded in a Business agility program. An
enterprise agility value center acts as the nucleus for the business driven action
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
19. Coordination Diseconomies Hierarchy costs Specialization gains Coordination diseconomy : total costs of hierarchy are coordination costs and opportunity cost: not choosing the best coordination rights assignment. Specialization is effectively bounded at a small maximum efficient scale. Can trade off by either coordinating more, and losing less information…or coordinating less, and realizing greater specialization gains. Size Value Opportunity cost – information loss – increases costs of hierarchy Total costs exceed specialization gains
25. Costs Shape Modes of Production Markets Transaction costs Firms Peers Coordination costs Information loss Hierarchies Market failure Sharing costs Corpocracy Growth failure Atomization Failure point Organization Type of failure
36. PP and Firm Production Functions Firm coordination costs Firm production function Labor/Network Size Output PP production function Firm is more efficient producer PP community is more efficient producer PP marginal productivity exceeds firm marginal productivity Distributed economies of scale mean that at large scale, peer communities enjoy a significant cost advantage over firms
37.
38. Traditional Value Creation Publishing: finance, marketing, procurement Management mediates transactions between primary value activities Management coordinates and exploits complementaries between supporting value activities Traditionally, value activities were integrated because market transaction costs were high Production : creation, editing, finishing
39. Disintermediation: Integration to Disintegration Publishing : finance, marketing, procurement Management coordinates and exploits complementaries between supporting value activities Disintermediation: Markets mediate transactions between primary value activities Cheap information disintegrates traditional value chains: value activities rearrange in horizontal layers, yielding efficiency gains Production: creation, editing, finishing
40. Microproduction: Disintegration to Atomization Cheap coordination atomizes disintegrated value chains: value activities rearrange in microchunks, yielding efficiency gains Publishing : finance, marketing, procurement Community mediates transactions between primary value activities Community coordinates and exploits complementaries between supporting value activities Production : creation, editing, finishing
41. Microproduction: Distributed Economies of Scale Microchunks have a positive supply-side network externality: a peer’s private productivity is less than his social productivity Why? User N contributes green microchunk G . This microchunk is reusable . Microchunk reuse increases marginal productivity: G’s complementarity with other microchunks reduces the marginal cost of future productivity. This microchunk is modular . Microchunk modularity explodes production set. G’s complementarity with other microchunks creates explosion in product set possibilities.
50. Knowledge Pool Knowledge is an externality of value activities: learning-by-doing Knowledge pools when information and preferences shared during peer production are stored This knowledge enhances future productivity by informing peers about how to most efficiently modify inputs in order to produce the most-desired outputs Value activities (brown) have a knowledge externality, which flows into knowledge pool (silver).
51.
52. Increasing Returns Overview Productivity Increase New users Which accelerates Information sharing which attracts ultraspecialized in different activities at the margin (distributed economies of scale) about inputs and outputs ultraspecialized in different activities … New users Public knowledge Which grows about the most efficient coordination rights
57. Value Chain Evolution Peers Platform Peers Aggregator Inputs Manufacturer Marketer Distributor Retailer Cheap information disintegrates value chains, because segment consolidators realize specialization gains and economies of scope – integrated production becomes costly Cheap coordination atomizes disintegrated value chains and explodes value activities within layers, because microproducers realize distributed scale economies Inputs, Manufacturing, Marketing, Distribution, Retail Costly info and coordination integrates value activities – most economical way to produce Peers
58. Value Chains & Value Appropriation Infrastructure Content Search ISP Telco Inputs In disintegrated value chains, industry profitability migrates to the center (aka the ‘coordinator’) Manufacturer Marketer Distributor Retailer Creatives Producer Publisher Distributor Retailer 5% 20% 50% 20% 5% Why? Market power in horizontalized landscapes – layer dominance – flows from relative scope (t he center can realize the greatest marketing scope economies of scope via marketing, branding, and advertising), or relative specialization (the center can develop the most economically advantageous core competences) EG: Nike, EA, SeanJohn, Google
59. Value Chains & Value Appropriation Platform Peers Aggregator In atomized value chains, industry profitability will migrate to the edges 40% 20% 40% Inputs Platform Peers Aggregator Reconstructor 35% 10% 10% 10% 35% Why? Market power in atomized landscapes is a function of relative scale: the edges can realize the greatest relative economies of scale via demand and supply side network FX. The middle of the value chain explodes and can’t realize scale economies. Core competences for disintegrated value chain coordinators become core rigidities – value capture requires competences at both edges of the chain
60. The Explosion of the Middle Peers Peers Peers Platform Peers Aggregator In atomized value chains, industry profitability will migrate to the edges 40% 20% 40% Why? The center explodes and atomizes – hypercommoditization – and value shifts to adjacent segments , because they can realize scale economies from the exploded center’s output. Examples: Blogger, Bloglines, Flickr
61. The Commoditization of the Edge In atomized value chains, the same technology that explodes the middle commoditizes the old edges (example: cheap connectivity enables blogging). Industry profitability migrated to new edges. 40% 20% 40% Coordination Production Aggregation Blogger bloggers Bloglines AudBlog podcasters PodWorld Community Owners reviewers Become Connectivity 0-1% BitTorrent ISP
62. Value Appropriation Examples In atomized value chains, industry profitability will migrate to newer (and newer) edges Platform Peers Publisher Aggregator Reconstructor 35% 10% 5% 10% 35% Coordination Production Publishing Aggregation Filtering Laptop audio Artist Label Club DJ Blogger bloggers hosting search Bloglines MMOG Developer gamers Mods & plugins Community sites Gaming Open Market
65. Peer Production Model Inputs (Coordination) Means of Production Outputs (Aggregation) Explicitly modifiable by community Sell access to users Competition for access, prizes Wikipedia raw content Open or community regulated access Advertising and sponsorship % Ad revenue Wikipedia CMS Efficient information sharing % Sales revenue % Revenue from outputs Wikipedia entry Knowledge pool grows New aggregated public info Requirements Revenue stream Peer incentive Example Increasing Returns
66.
67.
68.
69.
70.
71.
72.
73.
74. Relative Advantages Efficient Info Sharing Peer Network Public Knowledge Productivity New Users Without a market making capability… … public knowledge doesn’t pool … new users aren’t attracted … marginal productivity doesn’t grow … increasing returns fail
75.
76. Peer Production Industry Structures & Rivalry Suppliers & Buyers: Control access to key technologies, inputs, and distribution channels – vertical integration Control buyer/supplier scope economies by controlling high-value complements Fragment/commoditize key technologies or inputs if you can’t control them Example: Amazon – Fedex deal
77. Peer Production Industry Structures & Rivalry Suppliers: Control access to key technologies or inputs – vertical integration Fragment/commoditize key technologies or inputs if you can’t control them EG: Complements: Create larger numbers of higher quality complements than competitors Raises switching costs by lowering relative value of substitutes Example: lightweight, open standards (RSS) drive cheap complementarity Anti-example: Apple closing off iPod/iTunes platform kills complementarity Buyers: Control distribution channels – vertical integration Fragment/commoditize distribution channels if you can’t control them EG: New Entrants: Vertical integration creates strong entry barriers Scale and speed economies in network markets create strong entry barriers Other sources: first-mover advantage, preemption, deterrence, complements, nonlinear pricing, differentiation Example: eBay’s user network
86. Peer Production Advantage Dot Com 1.0: Search engines, portals, networking services Peer Production Yellow Pages Fabs Low Search Economies High Coordination Economies Low High
87. Coordination Arbitrage Criteria Hedge Funds, VC Ford, GM Lifestyle goods Peer Production Sweet Spot Media… Low Input Indivisbility High Coordination Diseconomies Low High
88. Relative Advantages in… Amazon Peer Production Community Out of the Game Vital point eBay No Community Size Yes Market Making Capability No Yes
89. Who’s Attracted? Slackers: Inefficient info-sharing Restrict peer entry by invitation/referral Shift to part-closed model Control quality of complements Everyone : Sweet spot No one: Vital point Geeks: Expand scope Shift to fully open-access model Leverage viral effects & complements to win peers Low Knowledge Pool Size High Knowledge Pool Quality Low High
90. Productivity Explosions Productivity Implosion Real-World Productivity Real-World Productivity Productivity Explosion Low Community Size High Knowledge Pool Size Low High
91. Peer Production Cost Advantage Disintegrated Gains to Specialization Size of Production Set Atomized Integrated