595 research outputs found
Tech Dominance and the Policeman at the Elbow
One school of thought takes much of law and the legal system as essentially irrelevant to the process of technological evolution. This view takes as axiomatic that the rate technological change is always accelerating, that any firm or institution dependent on a given technology is therefore doomed to a rapid obsolescence. Law, at best, risks interfering with a natural progression toward a better technological future, hindering “the march of civilization.”
This paper discusses the historical role of antitrust investigation in changing the course of technological development by focusing on the example of the IBM litigation (1969 - 1984). While widely derided and seen as a failure, this essay challenges the conventional wisdom and suggests, with the benefit of decades of hindsight, that the IBM lawsuit and trial, despite never reaching a verdict, actually catalyzed numerous transformational developments key to the growth and innovation of the computing industries
Networking vendor strategy and competition and their impact on enterprise network design and implementation
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A
Rakennuksen käyttöjärjestelmän luonti: kokonaisvaltainen lähestymistapa
Purpose of this thesis is to examine requirements for a building operating system from a holistic perspective. To understand the context of the subject, an extensive literature review was carried out which explores the evolution of operating systems alongside the history of computing, unravelling the concept of an operating system. In addition, various building information systems, including building automation systems and internet of things systems are reviewed in order to understand modern and future trends of building technology. Furthermore, literature review investigates telecommunications and digital identity authentication through their evolution and standardisation towards interoperability, to provide knowledge on how to achieve interoperability in building systems.
An interview study was conducted as the empirical part of the study in order to complement the theoretical framework of the thesis. A dozen building digitalisation experts were interviewed, inquiring their insights on the current and future situation of building systems. More closely, open systems, open data, platform ownership, disruption, killer applications, user-centredness, and Finland’s opportunities were discussed in respect of the building operating system.
Building operating system requires connection between various technology inside a building, and collaboration between various parties who use and manage the building. The system should exploit open standards and enable open data. User-centred development should be encouraged for the benefits of end users. The system needs to expand globally to achieve critical mass and unleash its full potential as a platform. Each building with similar properties should have the same features, being able to use same services and applications in any building with an operating system, thus enabling portability. The system requires convenient software development kits, application programming interfaces and abstractions for the needs of software and service developers. A vibrant developer community is required to expand the platform and enable a wide range of services and applications.Tämän diplomityön tarkoituksena on tutkia rakennuksen käyttöjärjestelmän holistisia vaatimuksia. Laaja kirjallisuuskatsaus tehtiin aiheen ymmärtämiseksi, joka tutkii käyttöjärjestelmien evoluutiota rinnakkain tietojenkäsittelyn historian kanssa, tarkoituksena hahmottaa käyttöjärjestelmän käsitettä. Lisäksi, eri rakennusten tietojärjestelmiä, mukaan lukien rakennusautomaatiojärjestelmiä ja esineiden internet -järjestelmiä käytiin läpi ymmärtääkseen nykyisiä ja tulevia trendejä rakennusteknologiassa. Edelleen kirjallisuuskatsaus tutkii televiestintää ja sähköistä tunnistautumista niiden kehityksen ja standardisoinnin kautta kohti yhteentoimivuutta, tarjoten tietoa siitä, miten yhteentoimivuutta voitaisiin kehittää rakennusjärjestelmissä.
Haastattelututkimus tehtiin diplomityön empiirisenä osuutena, jonka tarkoituksena oli laajentaa työn teoreettista viitekehystä. Tusina rakennusten digitalisaation asiantuntijaa haastateltiin, joilta kysyttiin rakennusjärjestelmien nykytilasta ja tulevaisuudesta. Lähemmin, keskustelut käsittelivät avoimia järjestelmiä, avointa dataa, alustan omistajuutta, disruptiota, menestyssovelluksia, käyttäjäkeskeisyyttä sekä Suomen kansainvälistä potentiaalia rakennuksen käyttöjärjestelmän näkökulmasta.
Rakennuksen käyttöjärjestelmä vaatii rakennuksen sisällä olevien eri teknologioiden yhteenliittämisen, sekä yhteistyötä rakennusta käyttävien ja hallinnoivien osapuolten välillä. Järjestelmän pitäisi hyödyntää avoimia standardeja ja mahdollistaa avoimen datan käytön. Käyttäjäkeskeistä suunnittelua pitäisi kannustaa loppukäyttäjien etuja suosien. Järjestelmän täytyy levitä globaalisti saavuttaakseen kriittisen massan ja ottaakseen käyttöön sen koko potentiaalin. Jokaisella samankaltaisella rakennuksella täytyisi olla käytössään yhtäläiset ominaisuudet, mahdollistaen samojen palveluiden ja sovellusten käytön missä tahansa käyttöjärjestelmää käyttävässä rakennuksessa, täten mahdollistaen siirrettävyyden. Järjestelmä vaatii sopivat ohjelmointirajapinnat, abstraktiot ja ohjelmistokehykset sovellus- ja palvelukehittäjien tarpeita varten. Laaja kehitysyhteisö vaaditaan alustan levittämiseksi ja sovellustarjonnan laajentamiseksi
How open is open enough?: Melding proprietary and open source platform strategies
Computer platforms provide an integrated architecture of hardware and software standards as a basis for developing complementary assets. The most successful platforms were owned by proprietary sponsors that controlled platform evolution and appropriated associated rewards.
Responding to the Internet and open source systems, three traditional vendors of proprietary platforms experimented with hybrid strategies which attempted to combine the advantages of open source software while retaining control and differentiation. Such hybrid standards strategies reflect the competing imperatives for adoption and appropriability, and suggest the conditions under which such strategies may be preferable to either the purely open or purely proprietary alternatives
Commoditization: a threat or an opportunity?: a case study on IBM
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and EconomicsThe purpose of this work project is to analyze the concept of commoditization in the information technology industry (IT). It is based on a case study that describes how IBM, a successful company for more than seventy years, was affected by the commoditization of the personal computer segment in the early 1990s and the strategic transformation undertook by the company to overcome this problem. Furthermore, it is also emphasized IBM’s decisions to exit commoditized segments and to shift its portfolio towards services and software, due to their major contribution in bringing the company back to its leading position in the marketplace
Recommended from our members
Soft policies and hard competition: Government, industry, and user impacts on the development of Japan's software industry
The paper analyzes the development and structure of the Japan's software industry, focusing particular attention on the failure of government support policies to nurture an internationally competitive industry and the success of foreign software producers in the Japanese market. The research adopts an evolutionary approach to explain Japan's problems in building a competitive software industry except in games, challenging the validity of standard explanations such as cultural disadvantage and failure to adopt best practice. The pattern of development in the Japanese software industry results from strong user preference for customized software over packaged products. Large users develop highly customized software systems that reflect their unique organizational structures and operating advantages. Software is viewed as an input into the production process, rather than an output to be independently marketted. As such, the structure of the software reflects the administrative heritage of major industrial users as much as developments in computer technology. The tendency to emphasize customization favors intra-industry software advances over interindustry expansion. Moreover, high demand for customization combines with large variation in operating systems to fractionalize the industry and frustrate government support policies. Even though the Ministry of International Trade and Industry followed the same industry support model that proved so successful in manufacturing, an independent world class software industry has not developed. The preference for customization has also allowed foreign software producers to successfully pursue a hub and spoke strategy. Foreign producers have been able to expand their user base, thereby lowering unit cost and putting local software developers at a further disadvantage. The research suggests that this situation will continue
Conceiving Open Systems
This Article tells the story of the contest over the meaning of open systems from 1980 to 1993, a contest to create a simultaneously moral and technical infrastructure within the computer industry
Design, Commissioning and Performance of the PIBETA Detector at PSI
We describe the design, construction and performance of the PIBETA detector
built for the precise measurement of the branching ratio of pion beta decay,
pi+ -> pi0 e+ nu, at the Paul Scherrer Institute. The central part of the
detector is a 240-module spherical pure CsI calorimeter covering 3*pi sr solid
angle. The calorimeter is supplemented with an active collimator/beam degrader
system, an active segmented plastic target, a pair of low-mass cylindrical wire
chambers and a 20-element cylindrical plastic scintillator hodoscope. The whole
detector system is housed inside a temperature-controlled lead brick enclosure
which in turn is lined with cosmic muon plastic veto counters. Commissioning
and calibration data were taken during two three-month beam periods in
1999/2000 with pi+ stopping rates between 1.3*E3 pi+/s and 1.3*E6 pi+/s. We
examine the timing, energy and angular detector resolution for photons,
positrons and protons in the energy range of 5-150 MeV, as well as the response
of the detector to cosmic muons. We illustrate the detector signatures for the
assorted rare pion and muon decays and their associated backgrounds.Comment: 117 pages, 48 Postscript figures, 5 tables, Elsevier LaTeX, submitted
to Nucl. Instrum. Meth.
- …