3,146 research outputs found

    Planting and harvesting innovation - an analysis of Samsung Electronics

    Get PDF
    This study explores how firms manage the entire life cycle of innovation projects based on the framework of harvesting and planting innovation. While harvesting innovation seeks new products in the expectation of financial performance in the short term, planting innovation pursues creating value over a long time period. Without proper management of the process of planting and harvesting innovation, firms with limited resources may not be successful in launching innovative new products to seize a momentum in high tech industries. To examine this issue, the case of Samsung Electronics (SE), now an electronics giant originated from a former developing country, is analyzed. SE has shown to effectively utilize co-innovation to maintain numerous planting and harvesting innovation projects. Both researchers and practitioners would be interested in learning about how SE shared risks of innovation investment with external partners at the early stage of innovation cycles

    Seamless Infrastructure independent Multi Homed NEMO Handoff Using Effective and Timely IEEE 802.21 MIH triggers

    Full text link
    Handoff performance of NEMO BS protocol with existent improvement proposals is still not sufficient for real time and QoS-sensitive applications and further optimizations are needed. When dealing with single homed NEMO, handoff latency and packet loss become irreducible all optimizations included, so that it is impossible to meet requirements of the above applications. Then, How to combine the different Fast handoff approaches remains an open research issue and needs more investigation. In this paper, we propose a new Infrastructure independent handoff approach combining multihoming and intelligent Make-Before-Break Handoff. Based on required Handoff time estimation, L2 and L3 handoffs are initiated using effective and timely MIH triggers, reducing so the anticipation time and increasing the probability of prediction. We extend MIH services to provide tunnel establishment and switching before link break. Thus, the handoff is performed in background with no latency and no packet loss while pingpong scenario is almost avoided. In addition, our proposal saves cost and power consumption by optimizing the time of simultaneous use of multiple interfaces. We provide also NS2 simulation experiments identifying suitable parameter values used for estimation and validating the proposed mode

    Profiting in the info-communications in the age of broadband: lessons and new considerations

    Get PDF
    Who profits in the info-coms industry in the broadband age, and how? This paper looks at this question, decomposing the industry in terms of five complementary activities: (1) equipment provision, (2) network operation, (3) Internet access and service provision, (4) navigation and security provision, and (5) Internet content provision, which correspond to five different assets in the sense of Teece (1986). By focusing on two key stylized facts (SF1: “R&D and patent licensing are increasingly high in this industry, but the initiators of innovations have greatly changed over time”, and SF2: “Small, facilities-less companies emerged during the development of the Internet industry, but have generally performed badly as the industry has matured and broadband use has become widespread”) the paper analyses the robustness of Teece (1986) in its ability to provide a framework appropriate to the changes that have occurred in the broadband industry. The paper draws some lessons, and provides some new considerations related to the robustness of Teece's framework.

    Mechanisms for AAA and QoS Interaction

    Get PDF
    Proceedings of Third IEEE Workshop on Applications and Services in Wireless Networks, ASWN 2003. Bern, Switzerland, July 2-4, 2003.The interaction between Authentication, Authorization and Accounting (AAA) systems and the Quality of Service (QoS) infrastructure is to become a must in the near future. This interaction will allow rich control and management of both users and networks. DIAMETER and DiffServ are likely to turn into the future standards in AAA and QoS systems, but they are not designed to interact with each other. To face this, we propose a new Diameter-Diffserv interaction model and describe the Application Specific Module (ASM) implemented to allow this interaction. The ASM has been implemented and tested in a complete AAA-QoS IPv6 scenario

    Users, Economics, Technology: Unavoidable Interdynamics

    Get PDF
    This paper briefly presents some conclusions of a brainstorming session on the way technology is evolving in ICT. Technology advances have overcome society ability to answer, both in economic and in human aspects. The current design paradigms, of agnostic technology development, need to be reconsidered, and the user needs to be repositioned at the center of future developments

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Intellectual Property and Innovation: Changing Perspectives in the Indian IT Industry

    Get PDF
    Indian government has undertaken significant modifications in the IP regime of the country. This will lead to a realignment of business strategies by firms in several sectors. Similarly, with liberalization and globalization, new opportunities for IP creation may emerge for Indian firms. In this context, the paper attempts to document the emerging perspectives vis-ïżœ-vis IPRs in the Indian IT industry and explore factors that are driving the change in perspectives. Large IT firms and firms in high-end niche areas are proactively seeking IP based growth strategies. While they typically seek IP protection in Western nations and not so much in India, this has led them to perceive restrictive IP regimes more positively. IP regimes in the West are more relevant for IP creating Indian IT firms today but this may change in the near future as Indian market expands. Significant IP creation by MNC subsidiaries in India is also contributing to this change in perception. Survey data show that an average IT firm in India also perceives IP protection as an important appropriability mechanism, but access to markets and relevant complementary assets continue to be more important for appropriating profits from their economic activity. A positive view of the restrictive IP regimes also gets reflected in the demands of Indian industry associations for changes in the Indian law. Broadly, these changes in perceptions seem to be linked to the evolving global production networks, changing activity profile of Indian IT firms, emerging business opportunities and changes in the competitive scenario. The understanding of Indian IT firms of the complexities of IP regimes remains rudimentary and they will need significant preparation to deal with these IP related challenges.

    Employment status: an ethical way forward for determining liability in tort and employment

    Get PDF

    The Next Paradigm Shift in the Mobile Ecosystem: Mobile Social Computing and the Increasing Relevance of Users

    Get PDF
    Social computing has become the paradigm for the increasingly relevant role of users in the Internet world. In this paper, it is argued that mobile social computing will eventually cause an even bigger impact in the mobile ecosystem. We are already at the beginning of the "transference" of a significant part of Internet social computing usage to the mobile domain, where users are no longer passive consumers of content andapplications, but co-creators and even innovators of them. However, mobile social computing will go one step further in the contribution to the development of the mobile ecosystem, since it will put the many situations of users' daily activities at the centre stage. To prove this case, this paper gathers available data and evidence on the patterns of mobile social computing usage and discusses user innovation and user empowerment in the framework of the current mobile ecosystem.Mobile social computing, user innovation, mobile ecosystem.
    • 

    corecore