Wednesday, April 29, 2009
Wharton 11: Appropriating Gains from Innovaitons
While patents and related legal protection are often the first thing that comes to mind when one thinks about protecting gains from innovation, this strategy is often not the best course for ensuring appropriation of gains. While patents can offer strong legal protection in certain industries in others there are a number of weaknesses. First are the legal costs associated with patents. These legal costs are high both because the need to separate patents into small manageable parts, often resulting in a large number of patents for a single product innovation, with each patent costing a large amount of money to obtain, and the need to enforce patents through the use of litigation which is always very expensive and can require a tremendous amount of time on the part of the inventor. Another major problem with patents is that it puts the details of the innovation into the public eye where all can see exactly what the innovation does and how it works. Patents not only allow inventing around, but because of this disclosure, often make it easier. Inventing around is the process of developing a competing process or product containing many of the benefits of the original product, but without utilizing the patented aspects of the product.
Secrecy is an excellent tool for the protection and appropriation of gains from innovations. Perhaps the greatest advantage to secrecy is that it greatly reduces the risk of inventing around or competition to the original innovation. Secrecy has this strength due to the inherent nature of very few people having access or knowledge of the innovation. Perhaps the greatest use of innovation is to increase the lead time that a company can have before an innovation has a large degree of competition. Perhaps the greatest weakness to secrecy is that it is very difficult or impossible to keep product (and to a lesser extent process) innovations secret after the product is released to the market, this is due to the ease of competition getting access to the product either through existing customers or by pretending to be a customer and acquiring the product.
Control of complementary assets includes resources such as access to distribution, service capability, customer relationships, supplier relationships, and complementary products.
...More to come soon...
Wednesday, April 22, 2009
Wharton Chapter 10: Scenario Planning for Disruptive Technologies
Friday, April 17, 2009
E.T. Project Progress Report
This has left me in a bit of a quandary as to the best way to proceed with my project. I have found several interesting and valuable articles related to contextual/location related advertising and search; however, almost everything I have found comes from media sources, such as news and magazine articles, rather than academic sources. Much like the search dilemma this leaves the majority of my available information lacking much in the way of technological detail; however, the background of the technology, I believe, is sufficient to work with.
Additionally, I have been considering a bit of a shift in focus from search marketing to viral/social marketing and the concepts of market mavens and social networking analysis. I know that early on you mentioned this as an area that I might consider, my concern at that time was that I had worked on a similar project for my internet marketing class with Prof. MacDonald, and I wasn’t certain that I would be able to approach those ideas in a sufficiently different manner to justify a new project entirely.
I welcome any thoughts or ideas regarding my direction here.
Wednesday, April 8, 2009
Chapter 7: Technology Strategy In Lumpy Markets
The key to this chapter is the concept of lumpy markets. MacMilliam & McGrath describe lumpy markets as those that are, rather than having an even distribution of consumers, are divided by the features that consumers want and are distributed heavily around these features with fewer people at the overlaps resulting in what appears to be a series of lumps when graphed. These lumpy markets are important as they can help guide the selection of technological development on products and can show how to target different markets.
The key to understanding strategy in lumpy markets is understanding the options of how to approach technological development. The authors give three options for development:
- Single niche domination
- Niche fusion
- Creating a new technology envelope
Each of these approaches has advantages and disadvantages associated with it and can be a viable strategy.
Single niche domination is the selection of a specific market with a dedicated focus to the features and attributes that they most desire. This is a powerful selection as it allows the company to have a concentrated focus and most closely meet the needs and desires of the chosen market. However, the disadvantage is the same as the advantage. Since the focus is so fully set on one market the resulting product is often unsuitable or undesirable for the other markets, and a minor change in the needs of a market or the offering of competitors can have a significant impact on current market demand.
Niche fusion is the strategic decision to focus on more than one distinct market, fusing the needs of the markets together and allowing a broader appeal. The advantage to this is that the resultant technology has a broader appeal and is therefore more resilient regarding changes in the market. On the downside this approach takes away much of the focus that a niche player has and resultantly reduces the ability to satisfy the consumers’ needs and demands.
Creating a new technology envelope is perhaps the greatest solution for longer term success, as it ignores the current constraints of the technology and the consumer base and creates a new paradigm of focus that offers a product that can meet the needs of the largest audience and satisfy them very thoroughly. On the downside this approach is very difficult to accomplish and requires a significant departure from current technology, as a result the costs and risks can be enormous. This approach results in what is often considered to be a disruptive technology, which can result in the failure of the incumbent firms and the tremendous success of the new firm that has developed the new approach.
Wednesday, April 1, 2009
Assessing Future Markets for New Technologies
In this chapter Day reviews several keys to assessing future markets for new and emerging technologies. This is a key element in managing an emerging technology; no matter how significant an improvement or how amazing the perceived potential of a new technology, without a market for the technology all investment and time spent developing the technology is for naught. Day’s review covers three primary activities in assessing markets for emerging technology: diffusion and adoption, exploration & learning and triangulation for insights. Exploration & learning is described as a process of “probe and learn” where the company uses a trial and error process to explore markets through interaction with perspective customers and development of prototypes and betas and the introduction of these to the perspective customers. Triangulation for insights is the process of learning from lead users, learning about latent needs, and anticipating inflections. Through the process of triangulation, assessing the interaction of these three items, one can direct the development of the product and identify the potential market for the product.
While both of the previous aspects are vitally important to successfully identifying markets the method that caught my attention the most was diffusion and adoption. Perhaps the primary reason that I was intrigued by this was the similarities that this concept has to the concept of “crossing the chasm.” It seems to me that the mistakes mentioned in this section are dominant mistakes that cause new technologies to fail. Of particular interest is the idea that thinking of the model of user adoption can lead to failure as one intuitively expects to make a progression through the ranks of adoptors. As Day mentions this is a common mistake that people make, assuming that this is a progression without considering the different needs and values of each set of users. Often times managers expect that each new group will follow the prior group in adoption of a new technology, when the new group, while they may share similar needs, has different views of the world, which often need to be addressed specifically to provide a viable product. The use of triangulation is an excellent tool to help prevent this mistake.