3,146 research outputs found
Planting and harvesting innovation - an analysis of Samsung Electronics
This study explores how firms manage the entire life cycle of innovation projects based on the framework of harvesting and planting innovation. While harvesting innovation seeks new products in the expectation of financial performance in the short term, planting innovation pursues creating value over a long time period. Without proper management of the process of planting and harvesting innovation, firms with limited resources may not be successful in launching innovative new products to seize a momentum in high tech industries. To examine this issue, the case of Samsung Electronics (SE), now an electronics giant originated from a former developing country, is analyzed. SE has shown to effectively utilize co-innovation to maintain numerous planting and harvesting innovation projects. Both researchers and practitioners would be interested in learning about how SE shared risks of innovation investment with external partners at the early stage of innovation cycles
Seamless Infrastructure independent Multi Homed NEMO Handoff Using Effective and Timely IEEE 802.21 MIH triggers
Handoff performance of NEMO BS protocol with existent improvement proposals
is still not sufficient for real time and QoS-sensitive applications and
further optimizations are needed. When dealing with single homed NEMO, handoff
latency and packet loss become irreducible all optimizations included, so that
it is impossible to meet requirements of the above applications. Then, How to
combine the different Fast handoff approaches remains an open research issue
and needs more investigation. In this paper, we propose a new Infrastructure
independent handoff approach combining multihoming and intelligent
Make-Before-Break Handoff. Based on required Handoff time estimation, L2 and L3
handoffs are initiated using effective and timely MIH triggers, reducing so the
anticipation time and increasing the probability of prediction. We extend MIH
services to provide tunnel establishment and switching before link break. Thus,
the handoff is performed in background with no latency and no packet loss while
pingpong scenario is almost avoided. In addition, our proposal saves cost and
power consumption by optimizing the time of simultaneous use of multiple
interfaces. We provide also NS2 simulation experiments identifying suitable
parameter values used for estimation and validating the proposed mode
Profiting in the info-communications in the age of broadband: lessons and new considerations
Who profits in the info-coms industry in the broadband age, and how? This paper looks at this question, decomposing the industry in terms of five complementary activities: (1) equipment provision, (2) network operation, (3) Internet access and service provision, (4) navigation and security provision, and (5) Internet content provision, which correspond to five different assets in the sense of Teece (1986). By focusing on two key stylized facts (SF1: âR&D and patent licensing are increasingly high in this industry, but the initiators of innovations have greatly changed over timeâ, and SF2: âSmall, facilities-less companies emerged during the development of the Internet industry, but have generally performed badly as the industry has matured and broadband use has become widespreadâ) the paper analyses the robustness of Teece (1986) in its ability to provide a framework appropriate to the changes that have occurred in the broadband industry. The paper draws some lessons, and provides some new considerations related to the robustness of Teece's framework.
Mechanisms for AAA and QoS Interaction
Proceedings of Third IEEE Workshop on Applications and Services in Wireless Networks, ASWN 2003. Bern, Switzerland, July 2-4, 2003.The interaction between Authentication, Authorization and Accounting (AAA) systems and the Quality of Service (QoS) infrastructure is to become a must in the near future. This interaction will allow rich control and management of both users and networks. DIAMETER and DiffServ are likely to turn into the future standards in AAA and QoS systems, but they are not designed to interact with each other. To face this, we propose a new Diameter-Diffserv interaction model and describe the Application Specific Module (ASM) implemented to allow this interaction. The ASM has been implemented and tested in a complete AAA-QoS IPv6 scenario
Users, Economics, Technology: Unavoidable Interdynamics
This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have overcome society ability to answer, both in economic and in human aspects. The current design paradigms, of agnostic technology development, need to be reconsidered, and the user needs to be repositioned at the center of future developments
Critical Management Issues for Implementing RFID in Supply Chain Management
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains
Intellectual Property and Innovation: Changing Perspectives in the Indian IT Industry
Indian government has undertaken significant modifications in the IP regime of the country. This will lead to a realignment of business strategies by firms in several sectors. Similarly, with liberalization and globalization, new opportunities for IP creation may emerge for Indian firms. In this context, the paper attempts to document the emerging perspectives vis-ïżœ-vis IPRs in the Indian IT industry and explore factors that are driving the change in perspectives. Large IT firms and firms in high-end niche areas are proactively seeking IP based growth strategies. While they typically seek IP protection in Western nations and not so much in India, this has led them to perceive restrictive IP regimes more positively. IP regimes in the West are more relevant for IP creating Indian IT firms today but this may change in the near future as Indian market expands. Significant IP creation by MNC subsidiaries in India is also contributing to this change in perception. Survey data show that an average IT firm in India also perceives IP protection as an important appropriability mechanism, but access to markets and relevant complementary assets continue to be more important for appropriating profits from their economic activity. A positive view of the restrictive IP regimes also gets reflected in the demands of Indian industry associations for changes in the Indian law. Broadly, these changes in perceptions seem to be linked to the evolving global production networks, changing activity profile of Indian IT firms, emerging business opportunities and changes in the competitive scenario. The understanding of Indian IT firms of the complexities of IP regimes remains rudimentary and they will need significant preparation to deal with these IP related challenges.
The Next Paradigm Shift in the Mobile Ecosystem: Mobile Social Computing and the Increasing Relevance of Users
Social computing has become the paradigm for the increasingly relevant role of users in the Internet world. In this paper, it is argued that mobile social computing will eventually cause an even bigger impact in the mobile ecosystem. We are already at the beginning of the "transference" of a significant part of Internet social computing usage to the mobile domain, where users are no longer passive consumers of content andapplications, but co-creators and even innovators of them. However, mobile social computing will go one step further in the contribution to the development of the mobile ecosystem, since it will put the many situations of users' daily activities at the centre stage. To prove this case, this paper gathers available data and evidence on the patterns of mobile social computing usage and discusses user innovation and user empowerment in the framework of the current mobile ecosystem.Mobile social computing, user innovation, mobile ecosystem.
- âŠ