The document discusses technology exports and joint ventures. It provides details on different types of technology exports, including transfers of intellectual property rights and licensing agreements. It also outlines the objectives and needs for technology exports, such as earning royalties and accessing technical knowledge. Joint ventures are described as strategic partnerships between two or more companies, where they share resources to achieve common goals. Successful factors for joint ventures include partner selection, access to financing, adopting modern practices, and technology transfers. Examples provided include the Shanghai BOC industrial gases joint venture and the Sony-Ericsson mobile phone partnership.
Types of technology transfer & acquisition; Modes of technology transfer; Importance, barriers & steps in internal technology transfer; Importance, barriers & steps in external technology transfer; Management of technology acquisition by a nation;
Basics of technology absorption; Management of technology absorption by an organization and a nation; Types & characteristics of technology diffusion, Global trends of technology diffusion & management
Types of technology transfer & acquisition; Modes of technology transfer; Importance, barriers & steps in internal technology transfer; Importance, barriers & steps in external technology transfer; Management of technology acquisition by a nation;
Basics of technology absorption; Management of technology absorption by an organization and a nation; Types & characteristics of technology diffusion, Global trends of technology diffusion & management
OBJECTIVE
Import of all kinds of goods and on the export of goods on certain situations attracts customs duty. The Customs Act,1962 contains provisions which govern the levy of customs duty. In this webinar, we shall understand the provisions for levy of customs duty and exemptions from customs duty.
Foreign Direct Investment (Theories of FDI)Mamta Bhola
the opening up of the national frontiers has led to a tremendous cross border movement of capital. This has led to a large number of MNC's that have invested foreign capital in a number of countries. MNC's through FDI have expanded their business operations to a large extent.
Discharge of negotiable instrument - Legal Environment of Business - Business...manumelwin
An instrument is said to be discharged when all rights of action under it are completely extinguished and when it ceases to be negotiated. This would happen when the party who is ultimately liable on the instrument is discharged from liability
It includes concepts of Technology Management along with key concepts associated with Technology Management like technology forecasting, technology strategy, technology acquisition, technology audit, technology diffusion, technovation etc.
This is the one important component of business environment. technological environment is external environment which affects the business. it provides opportunities as well as threats to our business. so understanding of technological environment is important to business man.
Licensing & franchising - International Business - Manu Melwin Joymanumelwin
Licensing is another way to enter a foreign market with a limited degree of risk. Under international Licensing, a firm in one country permits a firm in another country to use its intellectual property( Patents, trade marks etc).
venture capital, process of venture capital, stages of venture capital, stages and process of venture capital, early stage finance, later stage financing,
OBJECTIVE
Import of all kinds of goods and on the export of goods on certain situations attracts customs duty. The Customs Act,1962 contains provisions which govern the levy of customs duty. In this webinar, we shall understand the provisions for levy of customs duty and exemptions from customs duty.
Foreign Direct Investment (Theories of FDI)Mamta Bhola
the opening up of the national frontiers has led to a tremendous cross border movement of capital. This has led to a large number of MNC's that have invested foreign capital in a number of countries. MNC's through FDI have expanded their business operations to a large extent.
Discharge of negotiable instrument - Legal Environment of Business - Business...manumelwin
An instrument is said to be discharged when all rights of action under it are completely extinguished and when it ceases to be negotiated. This would happen when the party who is ultimately liable on the instrument is discharged from liability
It includes concepts of Technology Management along with key concepts associated with Technology Management like technology forecasting, technology strategy, technology acquisition, technology audit, technology diffusion, technovation etc.
This is the one important component of business environment. technological environment is external environment which affects the business. it provides opportunities as well as threats to our business. so understanding of technological environment is important to business man.
Licensing & franchising - International Business - Manu Melwin Joymanumelwin
Licensing is another way to enter a foreign market with a limited degree of risk. Under international Licensing, a firm in one country permits a firm in another country to use its intellectual property( Patents, trade marks etc).
venture capital, process of venture capital, stages of venture capital, stages and process of venture capital, early stage finance, later stage financing,
The Importance of Linguistics in Business NetworkingNikhil Narula
Having trouble connecting with the right people? Take a look at how linguistics can help you communicate and connect better in your business networking methods.
TECHNOLOGY ADOPTION - Analyse the diffusion of innovation of Smartphone techn...Hansa Edirisinghe
This assignment in its task one attempts to analyze the diffusion of innovation of Smartphone technology using Geoffrey A Moore’s model contributed to Technology Adoption Life Cycle and under the Task two, a leading Human Resource solution provider hSenid Software International has been selected to analyze their adaption to Cloud Computing. - by Hansa Edirisinghe
Joint ventures - International Business - Manu Melwin Joymanumelwin
An equity joint venture is a contractual, strategic partnership between two or more separate business entities to pursue a business opportunity together. The partners in an equity joint venture each contribute capital and resources in exchange for an equity stake and share in any resulting profits.
Technology export can be - technological disclosure, technical
guidance, technical assistance, technology assignment, and
licensing. Technology export is normally implemented by
concluding various types of technology transfer agreements.
Charles Hills defines globalization as "The shift towards a more integrated and interdependent world economy". Globalization has two main components - the globalization of markets and the globalization of production.
According to International Monetary Fund, globalization means "the growing economic interdependence of countries worldwide through increasing volume and variety of cross border transactions in goods and services and of international capital flows and also through the more rapid and widespread diffusion of technology. Interdependency and integration of individual countries of the world is also called as globalization”.
Intangible assets, which account for up to 90% of a company's value, especially patents, which make up the largest proportion of these assets, are hardly ever utilized for corporate value creation despite their value. In this presentation, I introduce patent management solutions for the development of patents that can contribute to corporate value creation, using the latest digital technologies such as AI, blockchain, and Web 3.0. I also introduce measures to maximize the financial use of patent assets secured through such patent management. In particular, I will look into the domestic and overseas trends of STO (Security Token Offering), which have recently been gaining attention in S. Korea, and learn about strategies and methods for patent asset STO.
Similar to Technology Exports and Joint Ventures (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
2. TECHNOLOGY EXPORT
Technology export can be - technological disclosure, technical
guidance, technical assistance, technology assignment, and
licensing. Technology export is normally implemented by
concluding various types of technology transfer agreements.
Although there is no fixed interpretation or definition of a technology
transfer agreement, Article 30 of the Foreign Transactions and
Foreign Trade Act ,which sets out the provisions regarding
technology introduction contracts -a type of technical assistance
agreement ,which pertains to the transfer of patent rights and other
industrial property rights related to technology, the establishment of
the license and the right to exploit and use these rights or guidance
on technology related to business management.
3. Technology export includes:
1) Transfer of industrial property rights and other rights
related to technology (know-how)
2) Granting of licenses pertaining to industrial property
rights and technology (know-how)
3) Guidance on technology related to business management.
4) Granting of licenses pertaining to patent rights and utility
model rights
5) Granting of licenses pertaining to currently claimed
inventions and devices
6) Granting of the right to use know-how
4. Technology export license
1) Who is involved? … Parties to the agreement, agent,
patentee, owner of know-how
2) What is licensed? … License targets (patent, know-
how, etc.) Patent right, right to obtain a patent, know-
how, copyright
3) What is the content? … Forms and conditions of the
license
4) Legal grounds/regulations binding the agreement? …
Acts involved.
5) Negotiations? …Negotiations between the
parties/representatives.
6) How is the agreement signed and managed? …
Contract management
5. Objectives of Technology Export
1) Avoid infringement of another’s patent rights and other intellectual
property rights.
2) Enable access to know-how, which is normally information kept secret by
the other party.
3) Earn royalties, make business safer, and raise cost performance (buy
time).
4) Opportunities for licensing agreements… When, where, and how.
Need of Technology Export
7. Offer Technical Assistance (licensing-out)
8. Receive Technical Assistance (licensing-in).
6. Offering technical assistance (licensing-out)
1) Technology transfer offers another useful means of earning besides the
production and sales of products (= open innovation).
2) Companies can receive a higher reputation for their technological power
that they can offer to other companies as technical assistance.
3) Surplus or idle technologies can be commercialized to reimburse
technological development expenses and maintenance fees incurred for
those technologies.
4) Companies can receive a grant-back for improved technology developed
by their licensees.
5) Technology transfer plays an important role in international strategies.
7. Receiving technical assistance (licensing-in)
1) Cost performance increases because there is no need for
technological development.
2) Time required for technological development can be reduced,
and the company’s position as the head starter can be secured.
3) Infringement of other companies’ rights can be avoided by
obtaining a license.
4) Companies’ weak points can be made up for.
5) Access to and the right to use other companies’ secrets and
useful information can be obtained.
8. Technology Exports Development
Organisation
TEDO, a unique Public-Private Partnership project between Confederation of Indian
Industry (CII) and Department of Scientific and Industrial Research (DSIR),
Ministry of Science & Technology, to enhance market linked technology
competitiveness of Indian Industry.
Started in the year 2000. The main objective is to promote Indian Technical Know How,
Technology Intensive Products/Services/Projects in global markets.
Since its inception TEDO has served approx 870 organizations (both public and private,
R&D, Academic & Industry) in terms of Capability Building to Enhance Export
Competitiveness and promoting there strengths in the international market.
Major Activities-
- Capability Building -through training programmes/workshops/lecture series/industry
visits and to upgrade existing plants to “world-class” facilities with cost effectiveness.
- Training Programmes-
IT Application in Manufacturing
International Business
Effective Trade Fair Participation
9. Indian SMEs are supported by TEDO.
Major International Trade fairs where TEDO support SMEs-
• Hannover Fair, Germany
• ACHEMA, Germany
• Euro mold, Germany
• Made in India Show in Mangolia
• Made in India Show in China
• Made in India show in Belarus
Exportable Technologies/Products/services-
• Light Engineering
• Chemical & Pharmaceuticals
• Agro and Food Processing
• Indian System of Medicine
10.
11. ADVANTAGES OF TECHNOLOGY EXPORT
• Can create fortunes worth billions of dollars for the exporters
as well as the early adopters .
• Technology can be adopted by developing countries to
improve living standards and security .
• Turn key projects can enable to exploit the expertise without
investing much in R&D and enable them to save on time.
• Exports of technology by developing countries can serve as an
indicator of their technological development
• It encourages local technological capabilities of the importer .
12. DISADVANTAGES OF TECHNOLOGY
EXPORT
• One negative aspect of licensing is that control over the
technology is weakened because it has been transferred to an
unaffiliated entity .
• In certain developing countries, there also may be problems in
adequately protecting the licensed technology export from
unauthorized use by third parties .
• It is not feasible to export all the technologies..eg developed
countries are cautious while exporting nuclear power related
technologies and products to developing countries .
• Adopters may innovate and surpass the actual technology
exporting entity
13. CONTINUED
• European Union & other western nations have strict
protectionist laws that affect technology licensing .
• Restricts the copying of patents , technology know-how
and other intellectual property rights .
• Because of the potential complexity of international
technology licensing & exporting agreements, firms
should seek qualified legal advice.
• do not reveal the whole range of technical progress under
way in the exporting countries, but do provide examples
of technical learning where the technology has been
assimilated, reproduced,
14. CASE STUDY : EXPORT OF AWACS TO INDIA BY ISRAEL
• ISRAEL exported 3 AWACS ( Airborne Warning & Control
Systems) for $ 1.1 bn
• India joined the global ranks of the AWACS operators .
• To provide broad spectrum crystal clear scan of air threats and
illegal Indian airspace entry even in worst climatic conditions .
• The system can receive transmissions from other air and
ground stations to round out its surveillance picture, and uses
sensor fusion to provide a complete picture of the battlespace
out to 500 kilometers.
15.
16.
17. Joint Venture is a win /win collaboration between two
or
more people, sharing resources to solve common
problems and achieve goals.
No limits, no catch, no selling, no manipulation, no risk.
It can be called a Strategic Alliance or Partnering as
well.
18. Joint Venture
HOME HOS T
C O U N TR C O U N TR Y
Y
MNE
LOCAL
Share of
Inputs
Inputs FIRM Profit
Joint Venture
Company
Share of Profit
34. Finding ideas or partners
• In the era of the Internet, finding opportunities for exploiting an idea
is sizeable together with remote, or advertised, communicating.
• There are also the blogging networks as well the social networking
sites and search engines.
• There are also other venues to find a JV partner such as seminars,
exhibitions, directories and the plain newspaper advertising of
opportunities.
• One should not forget websites which have become prosperous like
eBay and Amazon.com, Wikipedia, YouTube to name the most
obvious. Forming JVs with distributor and marketing agencies is
possible in this flat world to market a product. But finding an
entrepreneur for a JV is another task.
• Nonetheless, there are risk-takers- venture capitalists, angel
investors and venture managers (see: Carried interest) – especially in
the high-tech industries like IC chips or biotechnology.
35. Preparation
• One can here only underline the steps or information
that will be needed by the JV candidate. They are:
– the objectives, structure and projected form of the joint
venture, including the amount of investment and financing
arrangements and debt
– the JV's products, their technical description and usage
– alternate production technologies
– estimated cost of equipment
– estimated technology transfer costs
– foreign exchange projections (where applicable)
– staff requirements and trainingfinancial projections
– environmental impact
36. SELECTING PARTNERS
• The ideal process of selecting a JV partner
emerges from:
– screening of prospective partners
– short listing a set of prospective partners and some
sort of ranking
– due diligence – checking the credentials of the other
party
– availability of appreciated or depreciated property
contributed to the joint venture
– the most appropriate structure and invitation/bid
– foreign investor buying an interest in a local company
37. INCORPORATION
• A JV can be brought about in the following
major ways:
– Foreign investor buying an interest in a local
company
– Local firm acquiring an interest in an existing
foreign firm
– Both the foreign and local entrepreneurs jointly
forming a new enterprise
– Together with public capital and/or bank debt
38. SHAREHOLDERS AGREEMENT
• This is a legal area and is fraught with difficulty as the laws of countries
differ, particularly on the enforceability of 'heads of' or shareholder
agreements.
• For some legal reasons it may be called a Memorandum of
Understanding. It is done in parallel with other activities in forming a JV.
• Some of the issues in a shareholders' agreement are:
– Valuation of intellectual rights, say, the valuations of the IPR of one partner
and,say, the real estate of the other
– the control of the Company either by the number of Directors or its "funding"
– The number of directors and the rights of the founders to their appoint
Directors which shows as to whether a shareholder dominates or shares
equality.
– management decisions - whether the board manages or a founder
– transferability of shares - assignment rights of the founders to other members
of the company
– dividend policy - percentage of profits to be declared when there is profit
42. Shanghai BOC (SBOC)
• Established in 1988
• Between Wusong Chemical and British
Oxygen Company (BOC)
• Production of industrial gases
• In 1995
– net profit 5%
– turnover growth 8.4%
43. • SBOC (continued)
• Organization structure
– a board with 8 rep (half-half), one foreign and
one local general manager.
• Skills
– seek good employees with good training
• Successful factors
44. • Planning for future growth
– not able to meet 8 year payback but patience
– one half of the revenue used for R & D
– Raise additional capital of $30 million bank
loan to build gas processors at the customer’s
cites as marketing strategy
• Learning from the foreign partner
– able to learn new technology and practices
– focus on quality of product
– decisions are based on consensus and
consultation
45. Problems
• Increasing need for capital -thread for
wholly-owned subsidiary from BOC
• FX imbalance low foreign earnings due to
low volume of exports
• Sourcing and retaining staff
– below market salary
• Cultural differences
– - expatriate cannot speak Chinese
46. Successful factors for Joint Venture
• Partner selection
• Additional financing flexibility
• Modern management practices
• Technology transfer
• Location
- labor, materials, transportation
47. • Sony-Ericsson is a joint venture by the Japanese consumer
electronics company Sony Corporation and the Swedish
telecommunications company Ericsson to make mobile
phones. The stated reason for this venture is to combine
Sony's consumer electronics expertise with Ericsson's
technological leadership in the communications sector.
Both companies have stopped making their own mobile
phones.
• Virgin Mobile India Limited is a cellular telephone service
provider company which is a joint venture between Tata
Tele service and Richard Branson's Service Group.
Currently, the company uses Tata's CDMA network to offer
its services under the brand name Virgin Mobile, and it has
also started GSM services in some states.
48. Not so successful cross border
ventures.
• Mahindra-Renault joint venture
• In a joint venture between the two
companies, 51 per cent of the stake is held by
Mahindra and Mahindra while the rest of 49
per cent is being held by French car maker
Renault. But their first car Logan was a failure
because of technical reasons as well as stiff
competition from other makers. So this is the
example of a not so successful joint venture