The document discusses disruptive technologies and their impact on businesses and work. It notes that disruptive technologies will further change the landscape and discusses how to balance the fast pace of innovation with workforce and life balance. The session aims to provide a future perspective on where technology is headed and how it will impact businesses, work, and the connection between technology, business, and family.
Many analysts and writers talk about the transition that is happening in today's world: from the "Information Age", dominated by "transactions and documents" to the "Conceptual Age", governed by "relations".
The Conceptual Age redefines many of the traditional patterns. Co-creation is the norm and "Sharing knowledge" becomes more important than possessing it.
Leading Companies are accompaining this transformation by redefining themselves, changing from "organizations" to "organisms", where the previous "mechanical interactions" are being replaced by "organic touches". And the way in which these Companies do Business becomes a "social activity" shaped by the rich relationships involving employees, partners and customers.
Becoming a Social Enterprise is the way these leading Companies have chosen to address the challenges of the Conceptual Age.
In this presentation HintTech, leading system integrator in digital media, will take a look at how the benefits of enterprise Web Content Management and Digital Asset Management can be fully utilized by connecting them together, presenting real world benefits and a high level explanation of the integration options.
Lotusphere Id601 - Understanding the marketplace advantages for IBM Lotus sol...Ed Brill
In this session, we'll examine the marketplace for collaboration, highlighting where the industry is going and how IBM is innovating in this space. We'll then help to define the trends forming and highlight Lotus capabilities and their advantages. In addition, we'll discuss how IBM is positioned in the marketplace, discussing best practices, real-world experiences, and considerations customers should make when looking at these solutions. You'll learn how customers are examining the real costs involved in deploying these solutions in their organization. Come and hear the reasons why Lotus solutions are the choice of tens of thousands of customers worldwide.
This paper identifies four key emerging technologies in the IT-sector that are bringing a huge shift in the way information systems are developed and used. The key technologies covered in this paper are Cloud Computing, Mobile Data Networks, Smart-Connected-Devices and Big Data. The paper adopts a holistic view of the changes brought forward by these emerging technologies and presents a detailed analysis of their current performance and future potential.
Many analysts and writers talk about the transition that is happening in today's world: from the "Information Age", dominated by "transactions and documents" to the "Conceptual Age", governed by "relations".
The Conceptual Age redefines many of the traditional patterns. Co-creation is the norm and "Sharing knowledge" becomes more important than possessing it.
Leading Companies are accompaining this transformation by redefining themselves, changing from "organizations" to "organisms", where the previous "mechanical interactions" are being replaced by "organic touches". And the way in which these Companies do Business becomes a "social activity" shaped by the rich relationships involving employees, partners and customers.
Becoming a Social Enterprise is the way these leading Companies have chosen to address the challenges of the Conceptual Age.
In this presentation HintTech, leading system integrator in digital media, will take a look at how the benefits of enterprise Web Content Management and Digital Asset Management can be fully utilized by connecting them together, presenting real world benefits and a high level explanation of the integration options.
Lotusphere Id601 - Understanding the marketplace advantages for IBM Lotus sol...Ed Brill
In this session, we'll examine the marketplace for collaboration, highlighting where the industry is going and how IBM is innovating in this space. We'll then help to define the trends forming and highlight Lotus capabilities and their advantages. In addition, we'll discuss how IBM is positioned in the marketplace, discussing best practices, real-world experiences, and considerations customers should make when looking at these solutions. You'll learn how customers are examining the real costs involved in deploying these solutions in their organization. Come and hear the reasons why Lotus solutions are the choice of tens of thousands of customers worldwide.
This paper identifies four key emerging technologies in the IT-sector that are bringing a huge shift in the way information systems are developed and used. The key technologies covered in this paper are Cloud Computing, Mobile Data Networks, Smart-Connected-Devices and Big Data. The paper adopts a holistic view of the changes brought forward by these emerging technologies and presents a detailed analysis of their current performance and future potential.
THE 5 CHALLENGES
IMPEDING THE FUTURE OF IT TODAY
Is there any way to successfully navigate and leverage such a challenging industry?
If you are intersted in the whole research - than contact me.
The cloud computing market is growing rapidly, and the latest Gartner Hype Cycle shows that the hype around it has recently transformed into reality. In fact, eighty percent of Fortune 1000 companies are adopting cloud-operating models.
Cloud has significant implications on many roles within an organization and on IT service management. These implications on service management are increasing the discussions around the application and relevance of ITIL in cloud environments.
Organizations and professionals are looking to:
Develop cloud competencies to adopt cloud computing
Understand how cloud computing impacts service management
Adapt the ITIL framework to fit a cloud environment
Have a look and examine whether this can be a successful marriage or if a prenuptial agreement is required!
The topic of Big Data continues to gain momentum. This take, by Scot Wheeler, Sr. Director of Marketing Science at Critical Mass, was presented at the eMetrics conference in Boston, 10/1/2012.
Info360 Keynote by AIIM President John ManciniJohn Mancini
What is happening to Enterprise IT? What are the implications for your organization? What should you do about it? For more detail, see http://www.aiim.org/roadmap.
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
The new CIO is expected to be truly agile, deliver transformational value using new technology based services and have a deep understanding of, and engagement with the business – all whilst managing and mitigating risks. In addition to this, the CIO is also expected to be a ‘business partner’ in the real sense of the word. On top of these factors, Cloud is often seen in the eyes of business as a metaphor for timely change, and a convenient ‘get out of jail’ card in their push to lower IT cost, and collapse IT project lead times.
In this context, ensuring the effective orchestration if the various ‘best practice’ methodologies and frameworks in the areas of agile application development, project management and risk management, all whilst managing the whole ‘Cloud’ discussion is not a trivial task.
In this presentation, Rob Livingstone explores the key systemic and technical risks associated with the concurrent adoption and management of agile application development methodologies, project management, hybrid cloud and mobile devices within the enterprise in today’s volatile environment.
In our first update for 2013 we've asked each of our technical teams to provide an overview of the changes they have seen over the past year and what they will be focusing on in the next months.
Cloud computing implications for project management methodologiesLivingstone Advisory
Cloud based technologies are becoming increasingly pervasive across society and are considered by many in business as the next major disruptive innovation. For the first time, organizations can consume, as needed, on-demand, business ready Cloud based enterprise services. This is also known as the Consumerization of IT.
Transitioning to, or deploying new IT systems and services using Cloud technologies present their own unique set of challenges to the IT Departments, Project managers and Pproject management Offices (PMO) alike.
The primary objective of this presentation is to provide a number of key considerations for Project Managers in dealing with projects involving Cloud computing technologies.
This was presented at the 25th International Project Management Institute's Global Conference in Australia on the 11th October 2011 by Rob Livingstone
THE 5 CHALLENGES
IMPEDING THE FUTURE OF IT TODAY
Is there any way to successfully navigate and leverage such a challenging industry?
If you are intersted in the whole research - than contact me.
The cloud computing market is growing rapidly, and the latest Gartner Hype Cycle shows that the hype around it has recently transformed into reality. In fact, eighty percent of Fortune 1000 companies are adopting cloud-operating models.
Cloud has significant implications on many roles within an organization and on IT service management. These implications on service management are increasing the discussions around the application and relevance of ITIL in cloud environments.
Organizations and professionals are looking to:
Develop cloud competencies to adopt cloud computing
Understand how cloud computing impacts service management
Adapt the ITIL framework to fit a cloud environment
Have a look and examine whether this can be a successful marriage or if a prenuptial agreement is required!
The topic of Big Data continues to gain momentum. This take, by Scot Wheeler, Sr. Director of Marketing Science at Critical Mass, was presented at the eMetrics conference in Boston, 10/1/2012.
Info360 Keynote by AIIM President John ManciniJohn Mancini
What is happening to Enterprise IT? What are the implications for your organization? What should you do about it? For more detail, see http://www.aiim.org/roadmap.
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
The new CIO is expected to be truly agile, deliver transformational value using new technology based services and have a deep understanding of, and engagement with the business – all whilst managing and mitigating risks. In addition to this, the CIO is also expected to be a ‘business partner’ in the real sense of the word. On top of these factors, Cloud is often seen in the eyes of business as a metaphor for timely change, and a convenient ‘get out of jail’ card in their push to lower IT cost, and collapse IT project lead times.
In this context, ensuring the effective orchestration if the various ‘best practice’ methodologies and frameworks in the areas of agile application development, project management and risk management, all whilst managing the whole ‘Cloud’ discussion is not a trivial task.
In this presentation, Rob Livingstone explores the key systemic and technical risks associated with the concurrent adoption and management of agile application development methodologies, project management, hybrid cloud and mobile devices within the enterprise in today’s volatile environment.
In our first update for 2013 we've asked each of our technical teams to provide an overview of the changes they have seen over the past year and what they will be focusing on in the next months.
Cloud computing implications for project management methodologiesLivingstone Advisory
Cloud based technologies are becoming increasingly pervasive across society and are considered by many in business as the next major disruptive innovation. For the first time, organizations can consume, as needed, on-demand, business ready Cloud based enterprise services. This is also known as the Consumerization of IT.
Transitioning to, or deploying new IT systems and services using Cloud technologies present their own unique set of challenges to the IT Departments, Project managers and Pproject management Offices (PMO) alike.
The primary objective of this presentation is to provide a number of key considerations for Project Managers in dealing with projects involving Cloud computing technologies.
This was presented at the 25th International Project Management Institute's Global Conference in Australia on the 11th October 2011 by Rob Livingstone
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
As mobility, social business, cloud computing and analytics evolve, each may represent a significant opportunity to enable or transform enterprises, markets and industries. But collectively, could these capabilities create significant disruption in the postdigital enterprise? We'll discuss:
Characteristics of the postdigital era, including transparency, consumerization and a renewed focus on the individual.
Business value, risks, and considerations for the intersection of mobile, social, analytics, and cloud.
Examples of postdigital innovation and disruption of operating and business models.
Learn about the benefits of harnessing mobility, social business, cloud computing and analytics, and explore how the intersection of these capabilities can transform your organization into a postdigital enterprise.
For more: http://www.deloitte.com/view/en_US/us/Insights/Browse-by-Content-Type/dbriefs-webcasts/283129725a782310VgnVCM2000001b56f00aRCRD.htm
ASAE Tech Conference 2012 Closing Keynote on Disruptive TechDion Hinchcliffe
The deck I used for the closing address in Washington, DC on December 6th, 2012 at the ASAE Annual Conference. It explores the challenges and opportunities of the "Big Five" trends happening today: Smart Mobile, Social Media, the Cloud, Big Data, and Consumerization.I also included some non-profit trends for this audience.
The presentation is a slimmed down version of a presentation I'm delivering to a group of large financial investment executives. I take a look at the trends that are emerging out of the impact of the last two years of economic crisis and start to paint a picture of what I believe the software industry will look like going forward.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
The Collaboration of Disruptive Technology
1. 5/7/2012
The Collaboration of Disruptive
Technology
The Future is about technology and a lot more. It is about how do we use emerging
technologies such as new types of mobile platforms, html5, the Cloud redefined, the
movement of social into the business world and the rapid fire introductions of new
technology? Disruptive technologies will change the landscape even more. How can we
ba a ce the ast
balance t e fast pace o innovation with bot workforce a d ou o
of o at o t both o o ce and our own life ba a ce
e balance?
This session will provide the audience with a future perspective, not only where technology
is headed but how it will impact our businesses and the way we work. The line between all
aspects of technology, business, and family is blurring as the trend to bring your own
technology to work and connect it to the network accelerates. Where is this future heading?
The
Collaboration
of Disruptive
Technology
David Smith
CEO HBMGInc.
dsmith@HBMGINC.com
linkedin.com/in/davidsmithaustin
1
4. 5/7/2012
The Limits of Technology
Fundamental
• The laws of physics
• The laws of software
• The challenge of algorithms
• The difficulty of distribution
• The problems of design
• The importance of organization
• The impact of economics
• The influence of politics
• The limits of human imagination
Human
Copyright @2010 HBMG Inc.
4
5. 5/7/2012
The Growth Of Complexity
Higher
Technical
Complexity
DOD
weapon
Embedded system
automotive Telecom switch National Air
application Commercial Traffic Control
compiler System
Lower Higher
Management Management
Complexity Large-scale
simulation
Complexity
Small
scientific Enterprise
simulation Enterprise information
application systems DOD
management
information
system
Business
spreadsheet
Lower
Technical
Complexity
What use could this company make
of an electrical toy?
With those words, William Orton,
president of Western Union, dismissed
the newfangled gadget offered to him
for $100,000 in 1876.
Other leading lights echoed his
skepticism.
“An interesting novelty,” financier J.P.
g y
Morgan huffed.
5
6. 5/7/2012
Change, Uncertainty, and Complexity
Economic & Financial Virtual Worlds
Technology
Acceleration Cyber Warfare
Russia - China Intangible
K-12 Science Capital
& Math Crisis Pandemic
Terrorism Global Talent
Explosion
Offshore
Competition
p English as 2nd
3 Billion New Demographics
Capitalists
Economic Unions
Flat Wages Regional Economic End of Moore’s Law
Dislocation
Disruptors can be:
Technology
Regulatory
Economic
Civil
Natural Disasters
…
6
7. 5/7/2012
Business, Knowledge, and Innovation Landscape
• Typically 80% of the key knowledge (and value) is held
by 20% of the p p – we need to get it to the right
y people g g
people
• Only 20% of the knowledge in an organization is
typically used (the rest being undiscovered or under-
utilized)
• 80-90% of the products and services today will be
80 90%
obsolete in 10 years – companies need to innovate &
invent faster
Copyright 2012@ HBMG Inc.
7
12. 5/7/2012
A Crisis of Complexity. The Need for Progress
is Clear.
1.5x
Explosion of information
driving 54% growth in
storage shipments
every year.
70¢ per $1
70% on average is spent
on maintaining current IT
infrastructures versus
adding new capabilities.
85% idle
In distributed computing
environments,
environments up to
85% of computing
capacity sits idle.
70%+ Never
recover
Of business never
recover from a major
Howard Levenson, IBM data disaster.
Annual Operating Costs Are Out Of
Control
Physical
Spending Server Installed
Worldwide IT Spending on Servers, Power, Cooling Base (Millions)
US$(B) and Management/Administration
$250
50
Power and Cooling Costs 45
4
Server Mgt and Admin Costs
$200 New Server Spending 40
35
$150
30
25
$100 20
15
$50 10
5
$0 0
1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
IDC
12
16. 5/7/2012
Exposures
1. Increased Dependency on Complex
Technologies and Business Processes
2. Steep Decline of Barriers to Trade
3. Speed of Transactions
4. The Death of Distance
5. The Adoption of Advanced Communications
6. Consolidation/Transformation of Traditional
Industries
7. The Internet and the Abundance of Information
8. Infrastructure
9. Overcommitted Agencies
10.Changing Social Constructs
Threats and Vulnerabilities
– What’s at Stake
• Critical Infrastructures
• Key Resources
• New Resources
– The Case for Action
• Cyber Threats
• Insider Threats
• External Threats
• Cyber Terrorism
• Physical Attacks
32
16
17. 5/7/2012
Risk Management And Needed Security
High
mpact
Unacceptable Risk
Business defines im
Impact to business
Risk management
drives risk to an
acceptable level
Acceptable Risk
Probability of exploit
Low High
Security engineering defines probability
17
21. 5/7/2012
The Good Old Days for PC
For a long time way back in “Ye Olde Days,”
traditional IT management pretended that PCs
didn’t exist. (Would you like some COBOL with your
MVS system?)
While they were in “denial,” people bought the PCs
they wanted and “administered” them themselves.
Productivity increased immensely, at least for a while
y y,
While that sometimes worked well, other times chaos
reigned
42
21
22. 5/7/2012
The Modern Era
Today's more closely managed “enterprise” model
was the response to that anarchy.
At some sites, standardized PC configurations are
purchased and tightly locked down and are then
centrally administered.
43
Does The Following Sound Familiar?
Users find mobile devices useful.
Some IT folks find mobile devices threatening, or easy
to dismiss, or too expensive, or simply irrelevant.
Users buy what they want and use them in innovate
ways
44
22
28. 5/7/2012
Competing in a Global Business Environment
Taylor’s Law Sarnoff’s Law Metcalfe’s Law Reed’s Law
(1910 – 1950s) (1960 - 1980) (1980 - 2000) (2000 - Future)
Scientific Management “Human Side” Management Quality Management Era E-Manufacturing
Value Chain Value Shop
Firm Infrastructure Firm Infrastructure
Human Resources Management Human Resources Management Infrastructure
Technology Development Support
Technology Development Procurement
Procurement
Problem Finding Problem
& Acquisition Solving
After-
Inbound Operations Outbound Marketing sales Simon’s Problem Solving Model
Logistics Logistics & Sales Service Choice
Control/
Execution
Evaluation
Value Created in the Assembly Value Created by Transforming Value Created by Providing
Inputs Into Products Solutions, Not Services Value Created By
Line (Operations)
Self Forming Groups
Copyright @2010 HBMG Inc.
Sarnoff’s Law –1960s to mid 1980s
For one-way broadcast communication, the value of the
network itself rises proportionally to N, the potential number of
listeners.
Value Chain
Firm Infrastructure
Human Resources Management
Technology Development
Value
Procurement
Inbound Operations Outbound Marketing After
Logistics Logistics & Sales Sales-
Service
Sarnoff
Value created by transforming inputs into
products
N
Copyright @2010 HBMG Inc.
28
29. 5/7/2012
Internet Direction
Mainframe
Copyright @2008
HBMG Inc.
Metcalfe’s Law — Mid 1980s to 2000s
The value of a network increases exponentially with the
number of nodes – N2. A network becomes more useful as
more users are connected.
Value Shop
Firm Infrastructure
Human Resources Management Infrastructure
Technology Development Support
Procurement
Metcalfe
Problem
Value
Problem Finding
& Acquisition Solving
Simon’s Problem Solving Model Choice
Sarnoff
V
Control/
Execution
Evaluation
Value created by providing solutions, not
services
N
Copyright @2010 HBMG Inc.
29
30. 5/7/2012
Internet Direction
Servers
Copyright @2010 HBMG Inc.
Reed’s Law — 2001 and into the future
Any system that lets users create and maintain groups creates a set of
group-forming options that increase exponentially with the number of
potential members. And as a function, 2N dominates N2 - which means
that even if each individual group-forming option is worth much less than
an individual connection, eventually the total set of group-forming options
will have far more option value.
Value Network
Mediating technology facilitates exchange
relationships
Firm Infrastructure Reed
Human Resources Management
Value
Technology Development
Procurement
Network Promotion and Contract Management
• Invite and select Service Provisioning
customers to join Infrastructure
network • Establish
Establish, Operation
• Initialize,
maintain and
terminate links • Maintain and
Metcalfe
manage, and run physical
terminate
contracts
• Billing for value
received
and information
network
Sarnoff
N
Copyright @2010 HBMG Inc.
30
31. 5/7/2012
Internet Direction
Copyright @2010 HBMG Inc.
Competing in a Global Business Environment
Taylor’s Law Sarnoff’s Law Metcalfe’s Law Reed’s Law
(1910 – 1950s) (1960 - 1980) (1980 - 2000) (2000 - Future)
Scientific Management “Human Side” Management Quality Management Era E-Manufacturing
Value Chain Value Shop
Firm Infrastructure Firm Infrastructure
Human Resources Management Human Resources Management Infrastructure
Technology Development Support
Technology Development
Procurement
Procurement
Problem Finding Problem
& Acquisition Solving
After-
Inbound Operations Outbound Marketing sales
Logistics Logistics & Sales Service Simon’s Problem Solving Model Choice
Control/
Execution
Evaluation
Value Created in the Assembly Value Created by Transforming Value Created by Providing Value Created By
Line (Operations) Inputs Into Products Solutions, Not Services Self Forming Groups
•Standardization Parts •Stable Relationships •Lean Manufacturing •Consumer Centric
and Processes Design and Delivery
•Price Conscious •Shift to Horizontal Structure
•Economies of Scale •Flat Corporate
•Producer Led Design •Focus on Core
Structures
•Producer-Centric Competency
•Global Companies
Design, Mfg., and •Collaborative Virtual
•Reliability and Durability
y y
Delivery •Regionalism
Regionalism Networks
•Producer Led Design
•Vertical Orientation •Productivity •Mass Customization
•Multinational Trade
•Required inventory •Subsidiaries •Transparency
buffers •Market Centric
•Plant Replication by •Speed and Agility
Design & Delivery
•Locally Oriented Region
•Global Orientation
Copyright @2010 HBMG Inc.
31
32. 5/7/2012
S-Curve for Innovation,
Development, and Product
Life
100%
90%
se
Percentage of Installed Bas 80%
70%
60%
50%
40%
30%
20%
10% t∆ t∆ t∆
0%
Time
Science & Product Product Life
Research Development
Copyright @2010 HBMG Inc.
Research/Product Life Cycle
Research Development Product Life
Introduction Preliminary Active Mature Legacy Obsolete
Copyright @2010 HBMG Inc.
32
33. 5/7/2012
Research/Product Life Cycle
Research Development Product Life
Product Product Concept Business & Product Test
Generation Screening Development Marketing Development Marketing— Deployment
& Testing Strategy —Alpha Beta
Copyright @2010 HBMG Inc.
Research/Product Life Cycle
Research Development Product Life
Basic Science Experimental Directed Applied
Sand Box Discovery Science Research Research
Copyright @2010 HBMG Inc.
33
37. 5/7/2012
A New Regional Model
Emerging
Then…. Now….
Region D
Region A
Region B
Manufacturing
Region C
Research
Trials/Testing
Services
Region G
Development
Region E Region F
Self-Contained Specialized, Networked
Regional Clusters Regions
Copyright @2010 HBMG Inc.
From Austin to…
Network Emergent
Emergent
Emergent
networks
Networks
Networks
of Emergent
Companies
Companies
Companies
Companies
Networks
Copyright @2010 HBMG Inc.
37
38. 5/7/2012
Borg — a person who wears
a Bluetooth enabled
telephone headset,
especially when not in use
(a reference to the Star Trek
aliens who generally have
electronic devices on their
heads
Copyright @2010 HBMG Inc.
In Parting: Be Paranoid
“Sooner or later, something
fundamental in your business
world will change.”
Andrew S. Grove, Founder, Intel
“Only the Paranoid Survive”
Copyright @2008 HBMG Inc.
38
39. 5/7/2012
In Parting: Be Paranoid
“Sooner or later, something
fundamental in your business
world will change.”
Andrew S. Grove, Founder, Intel
“Only the Paranoid Survive”
Copyright @2008 HBMG Inc.
39