SA475: Trends in Technology - Computer Science

Download Report

Transcript SA475: Trends in Technology - Computer Science

SA475: Trends in Technology
Presented for
BlueCross BlueShield of South Carolina
By
The Rushing Center
Furman University
1
Key Learning Outcomes
When you complete this course you will be able to:
1)
Contrast the evolutionary versus the revolutionary approach to
technological innovation.
2)
Distinguish between sustaining and disruptive technologies and
innovations
3)
Discuss the elements of an innovation strategy.
4)
Give a brief description of the following emerging
technologies/innovations:










Grid (distributed/utility) computing
Virtualization
The Cloud
Crowdsourcing
Social Networking and Social Analytics
Context Aware Computing
Data mining
Nanotechnology
Quantum computing
Bio Technology in computing
2
CONTENTS






Module 1: Evolutionary vs. Revolutionary Change
Module 2: Sustaining vs. Disruptive Innovations
Module 3: Some Emerging Technologies/Innovations
Module 4: The Innovators Dilemma
Module 5: Elements of an Innovation Strategy
References
3
MODULE 1
Evolutionary vs. Revolutionary Change
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
4
Organizational Agility
Kathy Harris, Vice President and Distinguished Analyst in Gartner's
Executive Leadership and Innovation team, recently made the
following observation:
“Agility is an organization’s ability to sense changes and to
respond efficiently and effectively to them. In 2009, if there’s
one thing that organizations need, it’s agility. Our economy and the
business environment are a steady stream of ups, downs and rapid
change; in such an environment, the ability to sense, respond and
react are true survival skills! … Aim to make your organization agile
throughout – this means ensuring that people, processes and
technology are flexible and adaptable to change.”
5
Being a Change Leader
Peter Drucker, who has written extensively about innovation and
change, declares that it is “a central 21st-century challenge that
[organizations] become change leaders.”
He further asserts that change leader organizations will see change
as opportunity, and hence will actively seek out the right kind of
change for the organization.
While we might be tempted to assume that such organizations
would embrace bold and daring steps to establish themselves as
change leaders, the process Drucker describes for doing this is
an evolutionary as opposed to a revolutionary one. He
advocates an analytical and systematic approach focused on
creating continuous improvement as the primary basis for becoming
a change leader.
6
Good to Great
In his book, Good to Great, Jim Collins also finds evidence of the
value of an evolutionary approach to change. In his study of
companies that rose from good to great he found no pattern of
singularly identifiable, transforming moments to which they could
attribute their remarkable success.
He writes, “revolutionary leaps in (company) results were
evident, but not by revolutionary process.” In other words, he
found that, consistent with Drucker’s assertions, evolutionary, not
revolutionary, processes were at work.
7
Revolutionary Results
Total I/S Staffing Levels: 1993-2008
8
Revolutionary Results
Total Online Transactions: 1993-2008
9
Evolution, Not Revolution in I/S
The BCBSSC Information System Division has
taken a unique, evolutionary, and systematic
approach in the development and
implementation of its administrative and
operational practices over the past 20 years.
I/S Management Practices Manual
10
I/S Organizational Architecture: OSD-IT Model
External Influencing
Factors
Client Business
Environment
• Customers
• Client Business Definition
• Client
Choices
Mission
Guiding Principles
Strategies to Influence
External Environment
• User
Goals & Objectives
IT Industry
• IT Skill Sets
• Computer Technology
• Best Practices
11
A model-based evolutionary and
systematic approach in the
development and implementation
of an IT Organization’s
administrative and operational
practices.
Organizational
Culture
Outcomes
Advantages of the Evolutionary Approach
- Balancing Change and Continuity 


This approach has resulted in the creation of innovative, functionrich, and award-winning healthcare administrative systems based
on a standard, yet flexible systems architecture which
incorporates current and future business requirements that can be
leveraged across various business segments.
It has also provided the benefits of increased technological
economies of scale by leveraging technical capabilities within an
effective IT Service Management framework across various
business segments to efficiently handle increased operational
volumes.
And most importantly, it has provided the ability to integrate IT
staff as required while ensuring management philosophies and
administrative and operational practices remain intact.
I/S Management Practices Manual
12
The Nature of Innovation
Sustained improvements over time lead naturally to process and
product innovations.
Drucker has advocated that innovation is much more the product of
systematic hard work – what he calls the practice of innovation –
than of flashes of insight and genius.
He expresses it as follows. “To be effective, an innovation has to
be simple, and it has to be focused. The greatest praise an
innovation can receive is for people to say, ‘This is obvious!
Why didn’t I think of it? It’s so simple!’ By contrast, grandiose
ideas for things that will ‘revolutionize an industry’ are unlikely
to work.”
13
The Practice of Innovation



The process of systematically anticipating and proactively responding to change is very closely aligned
with the practice of innovation.
An innovation is more than a brilliant new idea.
An innovation is accomplished by creating something
new that also proves to be appropriate and useful for
some purpose.
14
Technology Brokering




Andrew Hargadon explores the idea of innovation as
systematic work in his book How Breakthroughs Happen.
Based on ten years of study into the origins of historic
inventions and modern innovations the book’s findings
reinforce that innovations do not usually result from
flashes of brilliance.
Instead, innovations are much more likely to come about
from the creative combination of ideas, concepts, and
products from existing technologies in ways that
spark new technological initiatives.
Hargadon calls this process technology brokering.
15
Hargadon’s “Rules”

The future is already here
 In other words, organizations that seek to anticipate
and exploit change will do well to consider carefully
the activities, products, and services they and others
are focused on in the present.
 It is almost always the baseline of present activities
that allows organizations to make the insightful moves
that position them as change leaders in their industry.
16
Hargadon’s “Rules”

Analogy trumps invention



Instead of searching for insights and flashes of brilliance that no
one else has thought about or considered, a more promising
approach is to look for successful ideas and inventions in other
areas and think creatively about how to combine them, modify
them, and apply them to the opportunity or problem you have at
hand.
This approach has more promise simply because it is much
easier to recognize the similarities between two situations than to
come up with something neither you nor anyone else has ever
thought of before.
In this approach, you attempt to think inside other boxes, to use
Hargadon’s phrase, instead of trying to follow the more common
advice of thinking “outside the box.”
17
I/S Guiding Principles
Technology itself is never a primary cause of either greatness or
decline in a business. Avoid technology fads and bandwagons.
Recognize that you cannot make good use of technology until you
know which technology is relevant to the business it supports.
Technology can accelerate business momentum, but not create it.
Therefore, you need the discipline to say no to the use of technology.
Crawl, walk, run is a very effective approach to technology
change!
18
I/S Guiding Principles
Keep your eye on the goal. Inventing the “Next Big Thing” is not the
goal. Building the “Current Big Thing” better than anyone else is the
goal. We are not Alpha inventors, we are Beta improvers!
19
I/S Guiding Principles
If you start with a blank sheet of paper, you’re dead. “Thinking outside
the box” has come to mean thinking of a solution that is somehow
outside of what you already know and do, and coming up with
something wholly new. Pushing people to think outside the box doesn’t
work. Instead, our approach to innovation is to take an idea or
solution that has been used somewhere else, combine a number of
existing ideas or solutions, and introduce them as a solution never
seen before.
20
I/S Guiding Principles
Maintain an attitude of healthy discontent. Sound management requires
a probing, inquiring mind. Satisfaction with the status quo should be
avoided. As you carry out your responsibilities as a manager,
intelligently question existing practices and procedures. Ensure the
most effective, up-to-date methods are being used. Actions based on
the rationale, “that's the way we've always done it" should be examined
closely. As a manager, you must not be afraid to challenge precedent.
Be alert for antiquated or improper practices, which must be changed.
21
Team Exercise
1)
2)
Can you identify some examples of evolutionary
innovations that the I/S Division has implemented?
Can you identify some examples of attempted
revolutionary change in the IT industry that didn’t
work out so well?
22
MODULE 2
Sustaining vs. Disruptive Innovations
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
23
Group Exercise: Case Study of DEC





Listen to the first part of the lecture by Clayton
Christensen.
What happened to DEC?
How did this happen?
Could it have been avoided?
What would it have taken to do this?
24
Sustaining Technology/Innovation
A sustaining technology/innovation is a
technology or innovation employed to improve a
company’s product or service to better meet their
customers’ needs.
Sustaining innovations can be:
• evolutionary
• revolutionary
• incremental and gradual
• discontinuous and dramatic
The distinction is not about the innovation
itself but rather what it is used to do.
25
Disruptive Technology/Innovation
A disruptive technology/innovation is a technology or
innovation employed to appeal to or even create a new
market.
Disruptive technologies and innovations
are often characterized (at least at first) by:
-
• inferior performance
• lack of appeal to established
customer base
• lower profit margins
+
• convenience
• appeal to a select group of potential customers
• lower cost
26
Sustaining or Disruptive?










Microsoft’s development of Internet Explorer
Open-source software (like Linux)
More fuel-efficient cars
Sustaining vs.
Electric cars
disruptive can
depend on your
The personal computer
perspective
Selling computers via the Internet
Selling stocks via the Internet
Education via the Internet
Online banking
Insurance claims processing via the Internet
27
Market for Disruptive Innovations?









The personal computer (in the early 1980s)
PDAs
Electric cars
Buying computers via the Internet
Buying stocks via the Internet
Open-source software (like Linux)
Online banking
Digital goods (books, music, movies, newspapers) via the
Internet
Books & travel via the Internet
How can such markets
change over time?
How might the rate of
potential change differ
for these examples?
28
Markets and Technology Innovations
sustaining
performance that
market can absorb
disruptive
time
Adapted from The Innovator’s Dilemma, Clayton Christensen
29
Group Exercise
1)
2)
3)
Identify some sustaining technologies or
innovations that BCBS of SC has implemented.
Would you classify any of these as potentially
disruptive technologies/innovations for others?
Can you identify potential future disruptive
technologies or innovations for the company?
30
MODULE 3
Some Emerging Technologies/Innovations
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
31
Some Emerging Technologies
 Grid
(distributed/utility) computing
 Virtualization
 The Cloud
 Crowdsourcing
 Social Networking and Social Analytics
 Context Aware Computing
 Data mining
 Nanotechnology
 Quantum computing
 Bio Technology in computing
Photo by Randall Schwanke
Emerging Technologies, MIT Technology Review
32
Grid (Distributed/Utility) Computing



Computing grids pool together and manage resources
from isolated systems to form a new type of low-cost
supercomputer
Makes supercomputing available where economics
would otherwise prevent this
Grids remained a bit of an oddity in the domain of
researchers for many years
Sustaining or disruptive?
33
Grid Computing: Non-commercial Uses




Most well-known example is the SETI@home
project (more than 5,000,000 volunteers and
more than 2,000,000 computing-years of CPU
time volunteered)
Oxford and Intel-United Devices cancer research
Photo by Jenny Rollo
project is another example (over 3,000,000 volunteers)
IBM sponsors an effort called World Community Grid that
connects volunteers with worthy scientific projects that could
benefit humankind (relatively new, 50,000+ members thus
far)
All of these involve:
 Volunteer efforts
 You sign up your computer and download a screensaver
which runs background processing whenever the
computer is idle
34
Grid Computing: Commercialization

Sun President, Jonathan Schwartz,
compared grid computing to history
of the electric power industry:
“The world does not need 5,000 different
custom electrical generators with 5 million
electricians customizing the distribution of
electricity. ... The industry around IT will likely
go through the same transformation that the
electric industry did about a hundred years ago.“

Bill Gates told InformationWeek six years
ago that grid computing is “the holy grail of
computing.”
35
Grid Computing: An Example
Video
Burlington Coat Factory Warehouse Corporation has deployed an enterprise
Grid computing infrastructure utilizing Oracle 10g software. The retailer's
adoption of an Oracle Grid computing solution has begun the enablement to
deliver higher application service levels, improve Information Technology (IT)
resource utilization, and allow for scalability of IT systems to support future
growth.
"Grid computing is viable with Oracle 10g," said Michael Prince, CTO, Burlington
Coat Factory. "Oracle 10g does away with the complexity related to deploying
and managing a grid. Our grid is automated, redundant, and delivers a pool
of IT resources large enough to deal with the spikes in demand that occur."
"Our Grid infrastructure allows us to maximize the use of our hardware and
software infrastructure which is key to our ability to support mixed
workloads," said Brad Friedman, CIO, Burlington Coat Factory. "With a grid at
our disposal, we can run transactional, decision support and administrative
operations simultaneously while maintaining high levels of system availability
and performance."
36
The Cloud
What is Cloud Computing
Why Cloud Computing

The latest state of grid computing commercialization is often referred to
as cloud computing, or simply the cloud.

The name apparently derives from the fact that cloud computing
involves software that resides in the “clouds” of the Internet.

According to Vinton Cerf (one of the creators of the Internet and VP
and Chief Internet Evangelist at Google):
“At Google we operate a number of data centers around the world,
each of which contains a large number of computers linked to one
another in clusters. In turn, the data centers are linked through a highspeed private network. The data centers support applications and
services that users can access over the Internet to tap into virtually
unlimited computing power on demand, a process known as cloud
computing.”
37
The Cloud (cont’d)

Conceptually a cloud operates by creating virtual
machines (VMs) on servers. These VMs can be
created and configured in an instant, and
disappear just as fast when no longer needed.

These dynamically allocated VMs give users
access to essentially as much computing power
as they need for a very low price, compared to
what it would cost for them to provide the same
computing power on their own.

In addition to a low price, the user is relieved of all
maintenance issues.

The analogy with the electric grid captures the
concept very closely.
38
The Cloud (cont’d)

For example, Gmail, Twitter and Facebook are all
cloud applications.

The load and performance demands of each of
these are unpredictable and vary considerably
over time.

The almost-immediate expansion capabilities of
the cloud makes applications like these robust at
a reasonable cost.
39
The Cloud (cont’d)

Amazon, IBM, Microsoft, Sun, Salesforce and others are
implementing and experimenting with systems similar to
the one that Google has developed.

Currently, all these clouds operate in isolation
communicating only with their users.

Cerf suggests that one of the great challenges for cloud
computing is to create ways for the clouds to
communicate with each other, giving users the option of
moving data form one cloud to another without first
downloading it and then uploading it again to another
cloud.

Cloud computing service providers offer server space and
processing and often operate these servers for many
businesses
40
Computing in the Cloud
The 3 Ways to Cloud Compute

Cloud computing includes three main areas of
service:

Infrastructure as a Service (IaaS)


Platform as a Service (PaaS)


Delivery of a computing platform over the Internet
Software as a Service (SaaS)


Delivery of a networked computing structure over the
Internet
Delivery of software applications over the Internet
Cloud computing is more cost-effective
41
Infrastructure as a Service: Virtualization

Using virtualization, one host machine can operate as if it
were several smaller servers
Video
Virtualization can
generate huge savings.
Some studies have
shown that on average,
conventional data centers
run at 15 percent or less
of their maximum
capacity. Data centers
using virtualization
software have increased
utilization to 80 percent or
more
42
Platform as a Service:
Application Development in the Cloud
PaaS facilitate deployment of applications without the cost and complexity of
buying and managing the underlying hardware and software and hosting
capabilities.
PaaS provide all of the facilities required to support the complete life cycle of
building and delivering web applications and services entirely available from
43
the Internet.
Platform as a Service:
Application Development in the Cloud
Azure Video
Azure
Google App
Engine
Force.com video
44
Software-as-a-Service

Software-as-a-service (SaaS) – delivery model
for software in which you pay for software on a
pay-per-use basis instead of buying the software
outright




Use any device anywhere to do anything
Pay a small fee and store files on the Web
Access those files later with your “regular” computer
Makes use of an application service provider
Force.com video dashboards
9-45
Consumer Applications in the Cloud

Cloud computing makes it possible for companies to offer Webbased versions of popular personal computer programs

Google Apps - Replace Microsoft office?








Gmail, Google Calendar and Google Docs
Google Calendar
 Share your schedule
Get your calendar from your phone
Get event reminders via email or have text messages sent right to your
mobile phone.
Gmail
Google Docs
Google Reader
 Stay up to date: Google Reader constantly checks your favorite news
sites and blogs for new content.
 Share with your friends: Use Google Reader's built-in public page to
easily share interesting items with other people
 Use it anywhere, for free: Google Reader is free and works in most
modern browsers, without any software to install.
Google Sites
ZohoWriter
Microsoft Office Live
46
Business Applications in the Cloud

The Salesforce Service Cloud allows businesses to
pay as they use services, instead of owning
comparable software. Force.com video customer service
47
Application Programmable Interface (API)

Specifies the programming interfaces required
for software applications to interact with other
applications



Much as a user interface specifies menus, screen
layouts, and other aspects of how people interact with
software applications
APIs are software modules that enables
software applications to interact with each other.
Web services are APIs that Web applications
can request to run over the Internet
Creating New Applications from Data in the Cloud
Mashups









Mashups are Web applications that combine content or data from
multiple online sources into new Web applications
Contents are continually updated
Content for mashups often comes from Web feeds and Web services
Amazon uses mashup technologies to aggregate product descriptions with
partner sites and user profiles, commentaries, and images.
Travel sites, such as Travelocity, Kayak, Matador, and Travature, integrate
standard content (such as airfare search engines, travel guides, maps,
and hotel reviews) with comments, ratings, and images from users.
Creating mashups usually requires significant Web development
experience
Mapping mashups are the most popular type of mashup
HousingMaps.com
SpotCrime.com

SpotCrime displays the locations of criminal incident reports on a Google Map to
illustrate where crime takes place in a neighborhood.
49
The Cloud – Security Issues

In cloud computing, thousands of different clients use the
same hardware on a large scale – the key to the efficiency
of the cloud in providing such low cost services.

However, security researchers have demonstrated that
when two programs are running simultaneously on the same
operating system, an attacker can steal data by using an
eavesdropping program to analyze the way those programs
share memory space.

Could this same technique be used in clouds when different
virtual machines (VMs) run on the same server?

Several researchers recently demonstrated that this could in
fact happen utilizing Amazon’s Elastic Compute Cloud.
50
The Cloud – Security Issues (cont’d)

In 2008, a single corrupted bit in messages between servers
used by Amazon’s Simple Storage Service which provides
online data storage by the gigabyte, forced the system to
shut down for several hours.

In 2009, a hacker who correctly guessed the answer to a
Twitter employee’s email security question was able to grab
all the documents in the Google Apps account the employee
used.

Also in 2009, a bug comprised the sharing restrictions
placed on some users’ documents in Google Docs.
Distinctions were erased: anyone with whom you shared
document access could also see documents you shared
with anyone else.

Late in 2009, a million T-Mobile Sidekick smart phones lost
data after a server failure at Danger, a subsidiary of
Microsoft that provided the storage.
51
The Future of the Cloud

Amazon’s cloud customers include the New York
Times and Pfizer.

The City of Los Angeles uses Google Apps for
email and other routine applications.

The White House recently launched
www.apps.gov to encourage federal agencies to
utilize cloud services.
52
The Future of the Cloud (cont’d)





According to the Gartner Group:
 “By 2011, early technology adopters will forgo capital expenditures and
instead purchase 40 percent of their IT infrastructure as a service,”
 “Increased high-speed bandwidth makes it practical to locate
infrastructure at other sites and still receive the same response times."
69 % of America’s Internet users are using some form of Internet-based
computing, such as web-based e-mail or photo storage, according to a study
by Pew Research Center.
By 2013, 12 % of the world software market will be Internet based forms of
SaaS and cloud computing, according to Merrill Lynch.
What impact will a long-term, global recession have on cloud computing?
 A survey by ScanSafe, a SaaS provider of security services, revealed that
78% of IT managers believe economic uncertainty makes SaaS more
appealing.
"A move towards clouds signals a fundamental shift in how we handle
information," writes Stephen Baker in Business Week. "At the most basic
level, it's the computing equivalent of the evolution in electricity a century ago
when farms and businesses shut down their own generators and bought
power instead from efficient. industrial utilities."
53
The Future of the Cloud (cont’d)
The focus of IT innovation has shifted from hardware to software
applications. Many of these applications are going on at a blistering pace,
and cloud computing is going to be a great facilitative technology for a lot
of these people.
Dale Jorgenson, Harvard Economist and
expert on the role of IT in national productivity
Clouds are systems. And with systems, you have to think hard and know
how to deal with issues in that environment. The scale is so much bigger,
and you don’t have the physical control. But we think people should be
optimistic about what we can do here. If we are clever about deploying
cloud computing with a clear-eyed notion of what the risk models are,
maybe we can actually save the economy through technology.
Peter Mell, Leader Cloud Security Team
National Institute of Standards and Technology (NIST)
54
Crowdsourcing


•



Crowdsourcing organizations (involve their users in
the design and marketing of their products.
Shoe startup company RYZ (see next slide) sponsors
shoe design contests to help it understand which
shoes to create and how to market those designs.
Example: Netflix announcement of reward for
technology solution to its movie recommendation
Crowdsourcing combines social networking, viral
marketing, and open-source design, saving
considerable cost while cultivating customers.
With crowdsourcing, the crowd performs classic inhouse market research and development and does so
in such a way that customers are being set up to buy.
Video
Design by Crowdsourcing
The Future of Social Technology
 Gartner predicts that by 2016, social
technologies will be integrated with most
business applications.
 Companies should bring together their social
CRM, internal communications and
collaboration, and public social site initiatives
into a coordinated strategy.
57
Social Networking in Business
• Businesses can use these tools to reach out and market to
potential new customers.
• Many businesses have Facebook sites to market their
product to specific groups on Facebook.
• They can use these tools to support and give added
value to existing customers.
• A software company could have a blog that discusses indepth use of a software product.
• Businesses can use these tools within their company to
communicate between departments and share knowledge.
• Wiki – allows you (as a visitor) to create, edit, change, and
often eliminate content
• A company wiki could be set up as a repository of
expert information.
How Can Businesses Utilize Social
Networking Applications?
Social networking application


A computer program that interacts with and
processes information in a social network
Examples:

Survey Hurricane, a Facebook application created by
Infinistorm (www.infinistorm.com).


Users who install that application on their page can survey their
friends on topics of interest.
Applications for buying and selling items, comparing movies,
and so on
Social Analytics


 Social analytics describes the process of
measuring, analyzing and interpreting the results of
interactions and associations among people, topics
and ideas
These interactions may occur on social software applications used in the
workplace, or on the social Web.
Social analytics is an umbrella term that includes a number of specialized
analysis techniques such as:

social filtering,







techniques that identify information a user might be interested in
used to create "recommendation systems" that can, for example, enhance your
experience on a Web site by suggesting music or movies that you might like
social-network analysis,
sentiment analysis
social-media analytics.
Social network analysis tools are useful for examining social structure
and interdependencies as well as the work patterns of individuals, groups
or organizations.
Social network analysis involves collecting data from multiple sources,
identifying relationships, and evaluating the impact, quality or
effectiveness of a relationship.
Sentiment Analysis




Web Site
Video
Wikipedia defines sentiment analysis as the process that “aims to
determine the attitude of a speaker or a writer with respect to
some topic.”
Automated sentiment analysis is the process of training a
computer to identify sentiment within content through Natural
Language Processing (NLP). (Google Translate)
Various sentiment measurement platforms employ different
techniques and statistical methodologies to evaluate sentiment
across the web. Some rely 100% on automated sentiment, some
employ humans to analyze sentiment, and some use a hybrid
system.
The social media health of a brand is how it’s public sentiment
compares to that of its competitors.


If your sentiment is 20% negative, is that bad? The answer is, it
depends.
However, if you see your competitors with a roughly 50% positive and
10% negative sentiment, while yours is 20% negative, that probably
merits investigation to understand the drivers of these opinions.
Context Aware Computing
Video
 Using information about an end user’s
environment, activities, connections and
preferences to improve the quality of interaction
with that end user.
 The end user may be a customer, business partner or
employee.
 A contextually aware system anticipates the user's needs and
proactively serves up the most appropriate and customized
content, product or service.
 Gartner predicts that by 2013, more than half of Fortune 500
companies will have context-aware computing initiatives, and
by 2016, one-third of worldwide mobile consumer marketing
will be context-awareness-based
Context aware computing discussion
Context aware computing in the future
For instance, sensors attached to a TV remote control can collect data on how the
remote is held by different users and build profiles based on that. Such a remote, of
which Intel showed a prototype at the conference, could identify who’s holding the
remote and offer recommendations for TV shows based on that
Web 3.0
•Web 3.0 is the vision of the next generation of the Web in
which all of the information available on the Web is woven
together into a single experience.
•The related movement called the Semantic Web is a
collaborative effort to add a layer of meaning to existing
information to reduce the amount of human time spent in
searching and processing that information.
•This potentially could have huge effects on businesses as
simple analysis becomes mechanized, requiring fewer
humans to perform this basic task.
Linking Data in Context:
A Prelude to Web 3.0 and Beyond

Web 3.0 is the name that is being used to
describe emerging trends that allow people and
machines to link information in new way


Personal Web assistants called Agents can make
decisions and take actions based on a user’s
preferences
Many describe Web 3.0 as the rise of the
Semantic Web

Intelligent software tools can read Web pages and
discern useful information from them.
64
Linking Data in Context:
A Prelude to Web 3.0 and Beyond
65
Linking Data in Context:
A Prelude to Web 3.0 and Beyond
66
Data Mining

We hear a lot about information overload

Information overload is often more accurately data
overload

Utilizing vast amounts of data requires smarter
methods for extracting information from data

Bioinformatics and the human genome project is a
prime example

Data mining is the technology
developed to attack such
problems
Photo by Elvis Santana
67
Data Mining

Data mining relies on advances in machine learning

The goal is to create a program that can
automatically analyze large data sets and decide
what information is most relevant for a particular
problem domain
This distilled information can then be used to
automatically make predictions or to help people
make decisions faster and more accurately

68
Data Mining: Two Models

Predictive models can be used to forecast unknown or
unseen values, based on patterns determined from known
results

Also called supervised data mining

Model developed before analysis

For example, from a database of customers who have
already responded to a particular offer, a model can be
built that predicts which prospects are likeliest to respond
to the same offer

Statistical techniques used to estimate parameters

Examples


Regression analysis – measures impact of set of variables on one
another
Used for making predictions
69
Data Mining: Two Models


Descriptive models describe patterns or
underlying processes in existing data, and are
generally used to create meaningful subgroups
such as demographic clusters
Also called unsupervised data mining


Apply data mining techniques and observe results
Analysts create hypotheses after analysis to explain patterns
found


No prior model about the patterns and relationships that might
exist
Common statistical technique used:

Cluster analysis to find groups of similar customers from
customer order and demographic data.
70
Regression Analysis
CellphoneWeekendMinutes = 12 + (17.5 * CustomerAge) +
(23.7 * NumberMonthsOfAccount)


Using this equation, analysts can predict number of
minutes of weekend cell phone use by summing 12,
plus 17.5 times the customer’s age, plus 23.7 times
the number of months of the account.
Considerable skill is required to interpret the quality
of such a model
Uses of Regression Analysis:
• Predicting sales amounts of new product based on
advertising expenditure.
• Predicting wind velocities as a function of temperature,
humidity, air pressure, etc.
• Time series prediction of stock market indices.
Data Mining: Sampling of Business Applications
Video













Market segmentation
Error detection
Evaluation of sales patterns
Credit risk analysis
Ad revenue forecasting
Claims processing
Credit risk analysis
Cross-marketing
Customer profiling
Customer retention
Electronic commerce
Exception reports
Food-service menu analysis













Fraud detection
Government policy setting
Hiring profiles
Market basket analysis
Medical management
Member enrollment
New product development
Pharmaceutical research
Process control
Quality control
Shelf management
Targeted marketing
Warranty analysis
72
Neural Networks
NN Video
Neural networks



Popular supervised data-mining technique used to
predict values and make classifications such as
“good prospect” or “poor prospect” customers
Complicated set of nonlinear equations
See kdnuggets.com to learn more
2020?




Through data mining, companies, known as “data
aggregators”, will know more about your purchasing
psyche than you, your mother, or your analyst.
If you use your card to purchase “secondhand clothing,
retread tires, bail bond services, massages, casino
gambling or betting” you alert the credit card company of
potential financial problems and, as a result, it may cancel
your card or reduce your credit limit.
Absent laws to the contrary, by 2020 your credit card data
will be fully integrated with personal and family data
maintained by the data aggregators (like Acxiom and
ChoicePoint).
By 2020, some online retailers will know a lot more about
you, data aggregators, and most consumer’s purchases
than we’ll know ourselves.
Semantic Security

Security is a difficult problem


Unintended release of protected
information
Physical security



Protect through passwords and permissions
Delivery system must be secure
Semantic security


Unintended release of protected information
through release of unprotected reports
Equally serious and more problematic
Nanotechnology




Ability to manufacture extremely small devices
“Smart” nanodust may be combined with wireless
technologies to provide new environmental monitoring
systems
Current approach – start big and squeeze, press, slice, and
dice to make things small
Nanotechnology approach – start with the smallest element
possible (i.e., atom) and build up
This nanomechanical structure fabricated by a
team of physicists at Boston University consists of
a central silicon beam, 10.7 microns long and 400
nm wide, that bears a paddle-array 500 nm long
and 200 nm wide along each side. This antennalike structure oscillated at 1.49 gigahertz or 1.49
billion times per second, making it the fastest
moving nanostructure yet created.
76
Nanotechnology Impact
Video

Pharmaceuticals


Drug delivery encapsulated in “nano-spheres”
Electronics



Video2
Faster, smaller processors
Immense storage capacities
Material Science


Stronger materials
Super conductivity
Buckyball from Wikipedia
77
Quantum Computing

Many believe that quantum computing systems represent the
next major revolution in computing

Quantum computers will be exponentially faster than today’s
fastest supercomputers
78
Quantum Computing
Video

Quantum computing uses qubits instead of transistors (bits)

A single qubit (utilizing particle spin) stores and processes twice
as much information as a regular bit.

Combining qubits delivers exponential improvement
Two qubits are four times more powerful than two bits
 A 64-qubit computer would theoretically be 264 (=18 billion trillion)
times more powerful than the latest 64-bit computers!
The first prototype quantum computer (with two qubits) was created in
1998



In 2001, Almaden Research Center demonstrated a 7-qubit machine
(using 10 billion billion atoms) that could factor the number 15

In early February 2007, D-Wave Systems, Inc., a privately-held Canadian
firm headquartered near Vancouver, announced: “the world’s first
commercially viable quantum computer”
79
Quantum Computing and Security

RSA (public key) encryption is the basis for
securing data across networks today

The integrity of RSA encryption systems depends
on the practical difficulty of factoring the product
of two large primes

The incredible speed of quantum computers could
render this defense against unauthorized
decryption useless

But the news isn’t all bad, some researchers
believe new encryption methods depending on
characteristics of quantum computing could
provide the solution
80
Biometric Security

Best security is 3-step
1.
2.
3.


What you know (password)
What you have (card of some sort)
Who you are (biometric)
Today’s systems (ATMs for example) use only
the first two
One reason why identity theft is so high
9-81
Integrating Biometrics with Transaction
Processing


TPS – captures events of a transaction Video
Biometric processing system – captures
information about you, perhaps…





Weight loss
Pregnancy
Use of drugs
Alcohol level
Vitamin deficiencies
9-82
Integrating Biometrics with Transaction
Processing
9-83
Integrating Biometrics with Transaction
Processing



Is this ethical?
Can banks use ATMs and determine if you’ve
been drinking?
How will businesses of the future use biometric
information?


Ethically?
Or otherwise?
9-84
Biometric Self Tracking Tools


Monitoring tools now used in hospital ICU’s will
be wearable gadgets
Automatically send data to wearer’s cell phone
or computer around the clock.




Compared to doctor office visit .


Blood pressure
Hear rhythms
Mood
Could reveal a person’s health in context
Currently available to track


REM sleep patterns
Diet - diabetes
85
Big Data, Data Analytics and Hadoop

What is Big Data

What is Hadoop
More about Hadoop

86
The nature of the industry:
Online Retailers
BI Applications
Analysis of clickstream data
• Customer profitability analysis
• Customer segmentation analysis
• Product recommendations
• Campaign management
• Pricing
• Forecasting
•
•
Dashboards
Online retailers like Amazon.com and Overstock.com are examples of high volume operations who
rely on analytics to compete. As soon as you enter, their sites a cookie is placed on your PC and
all clicks are recorded. Based on your clicks and any search terms, recommendation engines
decide what products to display. After you purchase an item, they have additional information that
is used in marketing campaigns. Customer segmentation analysis is used in deciding what
promotions to send you. How profitable you are influences how the customer care center treats
you. A pricing team helps set prices and decides what prices are needed to clear out merchandise.
Forecasting models are used to decide how many items to order for inventory. Dashboards
monitor all aspects of organizational performance
MODULE 4
The Innovators Dilemma
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
88
View the Lecture
The Opportunity and Threat of
Disruptive Technologies
Professor Clayton Christensen
Harvard Business School
89
Group Exercise
1.
Do you see disruptive technologies looming in
your industry?
2.
Are these threats or opportunities?
3.
What are the key characteristics of the
disruptive technologies that your company
faces?
4.
Are the technologies strategically significant?
5.
What are their initial markets?
6.
How could your company address these disruptive
technologies?
90
MODULE 5
Innovation Strategy
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
91
Elements of an Innovation Strategy I

Look for growth outside of, but not too far from, your
core business
 What jobs can existing customers not do?
 Who are your worst customers?
 Where are the barriers that constrain consumption?
92
Elements of an Innovation Strategy II

How can we serve this market?
 Existing solutions are too expensive, too complicated
or do not quite do the job
 The solution is good enough along traditional
dimensions, but superior in dimensions that matter
more to the customer
 The business model has low overhead and high asset
utilization, and therefore allows lower prices or smaller
markets
 Powerful incumbents are not interested in pursuing the
strategy initially
93
Elements of an Innovation Strategy III

Pursue innovative opportunities
 Create specific opportunities
 Focus on patterns rather than numbers


Make “number of zeros” estimates – Guess at impact
Execute and adapt
 Good enough can be great
 Step, don’t leap
 The right kind of failure is success.
Video
94
Group Exercise: Innovation and Organization
1.
Does having an organization that utilizes
specialists contribute to innovation?
2.
Do you think a company could better promote
innovation if it had a group specifically devoted
to innovation?
3.
What are some of the pros and cons of having
such a group?
95
Key Learning Outcomes
When you complete this course you will be able to:
1)
Contrast the evolutionary versus the revolutionary approach to
technological innovation.
2)
Distinguish between sustaining and disruptive technologies and
innovations
3)
Discuss the elements of an innovation strategy.
4)
Give a brief description of the following emerging
technologies/innovations:








Grid (distributed/utility) computing
The Cloud
Crowdsourcing and Social Technology
Web 3.0
Data mining
Nanotechnology
Quantum computing
Biometric Security
96
WRAPPING UP!


Review of our original key
learning outcomes
Questions?
97
References
98



How Breakthroughs Happen, Andrew Hargadon,
Harvard Business School Press, 2003.
“The Change Leader,” Chapter 3 in Management
Challenges for the 21st Century, Peter Drucker,
Harper Business, New York, 2001.
Andrew Hargadon, an interview with the ACM online
journal Ubiquity, at
http://www.acm.org/ubiquity/interviews/v4i30_hargadon.html

Kathy Harris, Article on Gartner Blog found at:
http://blogs.gartner.com/kathy_harris/2009/04/28/innovation-andagility-two-do%E2%80%99s/

“Security in the Ether," David Talbot, MIT Technology
Review, February 2010.
99




The Innovators Dilemma, Clayton Christensen,
HarperBusiness Essentials, 2002 (originally published
in 1997 by the Harvard Business School Press).
The Innovators Solution, Clayton Christensen and
Michael Raynor, Harvard Business School Press,
2003.
"The Rules of Innovation," Clayton Christensen, MIT
Technology Review, June 2002.
"Disruptive Innovation: A New Diagnosis for Health
Care's 'Financial Flu'." Healthcare Financial
Management, John Kenagy and Clayton Christensen,
May 2002.
100