SA475: Trends in Technology - Computer Science

Download Report

Transcript SA475: Trends in Technology - Computer Science

SA475: Trends in Technology
Presented for
BlueCross BlueShield of South Carolina
By
The Rushing Center
Furman University
1
Key Learning Outcomes
When you complete this course you will be able to:
1)
Contrast the evolutionary versus the revolutionary approach to
technological innovation.
2)
Distinguish between sustaining and disruptive technologies and
innovations
3)
Discuss the elements of an innovation strategy.
4)
Give a brief description of the following emerging
technologies/innovations:






Peer-to-peer networking
Grid (distributed/utility) computing
The Cloud
Data mining
Nanotechnology
Quantum computing
2
CONTENTS






Module 1: Evolutionary vs. Revolutionary Change
Module 2: Sustaining vs. Disruptive Innovations
Module 3: Some Emerging Technologies/Innovations
Module 4: The Innovators Dilemma
Module 5: Elements of an Innovation Strategy
References
3
MODULE 1
Evolutionary vs. Revolutionary Change
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
4
Organizational Agility
Kathy Harris, Vice President and Distinguished Analyst in Gartner's
Executive Leadership and Innovation team, recently made the
following observation:
“Agility is an organization’s ability to sense changes and to
respond efficiently and effectively to them. In 2009, if there’s
one thing that organizations need, it’s agility. Our economy and the
business environment are a steady stream of ups, downs and rapid
change; in such an environment, the ability to sense, respond and
react are true survival skills! … Aim to make your organization agile
throughout – this means ensuring that people, processes and
technology are flexible and adaptable to change.”
5
Being a Change Leader
Peter Drucker, who has written extensively about innovation and
change, declares that it is “a central 21st-century challenge that
[organizations] become change leaders.”
He further asserts that change leader organizations will see change
as opportunity, and hence will actively seek out the right kind of
change for the organization.
While we might be tempted to assume that such organizations
would embrace bold and daring steps to establish themselves as
change leaders, the process Drucker describes for doing this is
an evolutionary as opposed to a revolutionary one. He
advocates an analytical and systematic approach focused on
creating continuous improvement as the primary basis for becoming
a change leader.
6
Good to Great
In his book, Good to Great, Jim Collins also finds evidence of the
value of an evolutionary approach to change. In his study of
companies that rose from good to great he found no pattern of
singularly identifiable, transforming moments to which they could
attribute their remarkable success.
He writes, “revolutionary leaps in (company) results were
evident, but not by revolutionary process.” In other words, he
found that, consistent with Drucker’s assertions, evolutionary, not
revolutionary, processes were at work.
7
Revolutionary Results
Total I/S Staffing Levels: 1993-2008
8
Revolutionary Results
Total Online Transactions: 1993-2008
9
Evolution, Not Revolution in I/S
The BCBSSC Information System Division has
taken a unique, evolutionary, and systematic
approach in the development and
implementation of its administrative and
operational practices over the past 20 years.
I/S Management Practices Manual
10
I/S Organizational Architecture: OSD-IT Model
External Influencing
Factors
Client Business
Environment
• Customers
• Client Business Definition
• Client
Choices
Mission
Guiding Principles
Strategies to Influence
External Environment
• User
Goals & Objectives
IT Industry
• IT Skill Sets
• Computer Technology
• Best Practices
11
A model-based evolutionary and
systematic approach in the
development and implementation
of an IT Organization’s
administrative and operational
practices.
Organizational
Culture
Outcomes
Advantages of the Evolutionary Approach
- Balancing Change and Continuity 


This approach has resulted in the creation of innovative, functionrich, and award-winning healthcare administrative systems based
on a standard, yet flexible systems architecture which
incorporates current and future business requirements that can be
leveraged across various business segments.
It has also provided the benefits of increased technological
economies of scale by leveraging technical capabilities within an
effective IT Service Management framework across various
business segments to efficiently handle increased operational
volumes.
And most importantly, it has provided the ability to integrate IT
staff as required while ensuring management philosophies and
administrative and operational practices remain intact.
I/S Management Practices Manual
12
The Nature of Innovation
Sustained improvements over time lead naturally to process and
product innovations.
Drucker has advocated that innovation is much more the product of
systematic hard work – what he calls the practice of innovation –
than of flashes of insight and genius.
He expresses it as follows. “To be effective, an innovation has to
be simple, and it has to be focused. The greatest praise an
innovation can receive is for people to say, ‘This is obvious!
Why didn’t I think of it? It’s so simple!’ By contrast, grandiose
ideas for things that will ‘revolutionize an industry’ are unlikely
to work.”
13
The Practice of Innovation



The process of systematically anticipating and proactively responding to change is very closely aligned
with the practice of innovation.
An innovation is more than a brilliant new idea.
An innovation is accomplished by creating something
new that also proves to be appropriate and useful for
some purpose.
14
Technology Brokering




Andrew Hargadon explores the idea of innovation as
systematic work in his book How Breakthroughs Happen.
Based on ten years of study into the origins of historic
inventions and modern innovations the book’s findings
reinforce that innovations do not usually result from
flashes of brilliance.
Instead, innovations are much more likely to come about
from the creative combination of ideas, concepts, and
products from existing technologies in ways that
spark new technological initiatives.
Hargadon calls this process technology brokering.
15
Hargadon’s “Rules”

The future is already here
 In other words, organizations that seek to anticipate
and exploit change will do well to consider carefully
the activities, products, and services they and others
are focused on in the present.
 It is almost always the baseline of present activities
that allows organizations to make the insightful moves
that position them as change leaders in their industry.
16
Hargadon’s “Rules”

Analogy trumps invention



Instead of searching for insights and flashes of brilliance that no
one else has thought about or considered, a more promising
approach is to look for successful ideas and inventions in other
areas and think creatively about how to combine them, modify
them, and apply them to the opportunity or problem you have at
hand.
This approach has more promise simply because it is much
easier to recognize the similarities between two situations than to
come up with something neither you nor anyone else has ever
thought of before.
In this approach, you attempt to think inside other boxes, to use
Hargadon’s phrase, instead of trying to follow the more common
advice of thinking “outside the box.”
17
I/S Guiding Principles
Technology itself is never a primary cause of either greatness or
decline in a business. Avoid technology fads and bandwagons.
Recognize that you cannot make good use of technology until you
know which technology is relevant to the business it supports.
Technology can accelerate business momentum, but not create it.
Therefore, you need the discipline to say no to the use of technology.
Crawl, walk, run is a very effective approach to technology
change!
18
I/S Guiding Principles
Keep your eye on the goal. Inventing the “Next Big Thing” is not the
goal. Building the “Current Big Thing” better than anyone else is the
goal. We are not Alpha inventors, we are Beta improvers!
19
I/S Guiding Principles
If you start with a blank sheet of paper, you’re dead. “Thinking outside
the box” has come to mean thinking of a solution that is somehow
outside of what you already know and do, and coming up with
something wholly new. Pushing people to think outside the box doesn’t
work. Instead, our approach to innovation is to take an idea or
solution that has been used somewhere else, combine a number of
existing ideas or solutions, and introduce them as a solution never
seen before.
20
I/S Guiding Principles
Maintain an attitude of healthy discontent. Sound management requires
a probing, inquiring mind. Satisfaction with the status quo should be
avoided. As you carry out your responsibilities as a manager,
intelligently question existing practices and procedures. Ensure the
most effective, up-to-date methods are being used. Actions based on
the rationale, “that's the way we've always done it" should be examined
closely. As a manager, you must not be afraid to challenge precedent.
Be alert for antiquated or improper practices, which must be changed.
21
Team Exercise
1)
2)
Can you identify some examples of evolutionary
innovations that the I/S Division has implemented?
Can you identify some examples of attempted
revolutionary change in the IT industry that didn’t
work out so well?
22
MODULE 2
Sustaining vs. Disruptive Innovations
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
23
Group Exercise: Case Study of DEC





Listen to the first part of the lecture by Clayton
Christensen.
What happened to DEC?
How did this happen?
Could it have been avoided?
What would it have taken to do this?
24
Sustaining Technology/Innovation
A sustaining technology/innovation is a
technology or innovation employed to improve a
company’s product or service to better meet their
customers’ needs.
Sustaining innovations can be:
• evolutionary
• revolutionary
• incremental and gradual
• discontinuous and dramatic
The distinction is not about the innovation
itself but rather what it is used to do.
25
Disruptive Technology/Innovation
A disruptive technology/innovation is a technology or
innovation employed to appeal to or even create a new
market.
Disruptive technologies and innovations
are often characterized (at least at first) by:
-
• inferior performance
• lack of appeal to established
customer base
• lower profit margins
+
• convenience
• appeal to a select group of potential customers
• lower cost
26
Sustaining or Disruptive?










Microsoft’s development of Internet Explorer
Open-source software (like Linux)
More fuel-efficient cars
Sustaining vs.
Electric cars
disruptive can
depend on your
The personal computer
perspective
Selling computers via the Internet
Selling stocks via the Internet
Education via the Internet
Online banking
Insurance claims processing via the Internet
27
Market for Disruptive Innovations?









The personal computer (in the early 1980s)
PDAs
Electric cars
Buying computers via the Internet
Buying stocks via the Internet
Open-source software (like Linux)
Online banking
Digital goods (books, music, movies, newspapers) via the
Internet
Books & travel via the Internet
How can such markets
change over time?
How might the rate of
potential change differ
for these examples?
28
Markets and Technology Innovations
sustaining
performance that
market can absorb
disruptive
time
Adapted from The Innovator’s Dilemma, Clayton Christensen
29
Group Exercise
1)
2)
3)
Identify some sustaining technologies or
innovations that BCBS of SC has implemented.
Would you classify any of these as potentially
disruptive technologies/innovations for others?
Can you identify potential future disruptive
technologies or innovations for the company?
30
MODULE 3
Some Emerging Technologies/Innovations
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
31
Some Emerging Technologies








Grid (distributed/utility) computing
The Cloud
Crowdsourcing, Social Technology
Web 3.0
Data mining
Nanotechnology
Quantum Computing
Biometric Security
Photo by Randall Schwanke
Emerging Technologies, MIT Technology Review
32
Grid (Distributed/Utility) Computing



Computing grids pool together and manage resources
from isolated systems to form a new type of low-cost
supercomputer
Makes supercomputing available where economics
would otherwise prevent this
Grids remained a bit of an oddity in the domain of
researchers for many years
Sustaining or disruptive?
33
Grid Computing: Non-commercial Uses




Most well-known example is the SETI@home
project (more than 5,000,000 volunteers and
more than 2,000,000 computing-years of CPU
time volunteered)
Oxford and Intel-United Devices cancer research
Photo by Jenny Rollo
project is another example (over 3,000,000 volunteers)
IBM sponsors an effort called World Community Grid that
connects volunteers with worthy scientific projects that could
benefit humankind (relatively new, 50,000+ members thus
far)
All of these involve:
 Volunteer efforts
 You sign up your computer and download a screensaver
which runs background processing whenever the
computer is idle
34
Grid Computing: Commercialization

Sun President, Jonathan Schwartz,
compared grid computing to history
of the electric power industry:
“The world does not need 5,000 different
custom electrical generators with 5 million
electricians customizing the distribution of
electricity. ... The industry around IT will likely
go through the same transformation that the
electric industry did about a hundred years ago.“

Bill Gates told InformationWeek six years
ago that grid computing is “the holy grail of
computing.”
35
Grid Computing: An Example
Video
Burlington Coat Factory Warehouse Corporation has deployed an enterprise
Grid computing infrastructure utilizing Oracle 10g software. The retailer's
adoption of an Oracle Grid computing solution has begun the enablement to
deliver higher application service levels, improve Information Technology (IT)
resource utilization, and allow for scalability of IT systems to support future
growth.
"Grid computing is viable with Oracle 10g," said Michael Prince, CTO, Burlington
Coat Factory. "Oracle 10g does away with the complexity related to deploying
and managing a grid. Our grid is automated, redundant, and delivers a pool
of IT resources large enough to deal with the spikes in demand that occur."
"Our Grid infrastructure allows us to maximize the use of our hardware and
software infrastructure which is key to our ability to support mixed
workloads," said Brad Friedman, CIO, Burlington Coat Factory. "With a grid at
our disposal, we can run transactional, decision support and administrative
operations simultaneously while maintaining high levels of system availability
and performance."
36
The Cloud
What is Cloud Computing
Why Cloud Computing

The latest state of grid computing commercialization is often referred to
as cloud computing, or simply the cloud.

The name apparently derives from the fact that cloud computing
involves software that resides in the “clouds” of the Internet.

According to Vinton Cerf (one of the creators of the Internet and VP
and Chief Internet Evangelist at Google):
“At Google we operate a number of data centers around the world,
each of which contains a large number of computers linked to one
another in clusters. In turn, the data centers are linked through a highspeed private network. The data centers support applications and
services that users can access over the Internet to tap into virtually
unlimited computing power on demand, a process known as cloud
computing.”
37
The Cloud (cont’d)

Conceptually a cloud operates by creating virtual
machines (VMs) on servers. These VMs can be
created and configured in an instant, and
disappear just as fast when no longer needed.

These dynamically allocated VMs give users
access to essentially as much computing power
as they need for a very low price, compared to
what it would cost for them to provide the same
computing power on their own.

In addition to a low price, the user is relieved of all
maintenance issues.

The analogy with the electric grid captures the
concept very closely.
38
The Cloud (cont’d)

For example, Gmail, Twitter and Facebook are all
cloud applications.

The load and performance demands of each of
these are unpredictable and vary considerably
over time.

The almost-immediate expansion capabilities of
the cloud makes applications like these robust at
a reasonable cost.
39
The Cloud (cont’d)

Amazon, IBM, Microsoft, Sun, Salesforce and others are
implementing and experimenting with systems similar to
the one that Google has developed.

Currently, all these clouds operate in isolation
communicating only with their users.

Cerf suggests that one of the great challenges for cloud
computing is to create ways for the clouds to
communicate with each other, giving users the option of
moving data form one cloud to another without first
downloading it and then uploading it again to another
cloud.

Cloud computing service providers offer server space and
processing and often operate these servers for many
businesses
40
Computing in the Cloud
The 3 Ways to Cloud Compute

Cloud computing includes three main areas of
service:

Infrastructure as a Service (IaaS)


Platform as a Service (PaaS)


Delivery of a computing platform over the Internet
Software as a Service (SaaS)


Delivery of a networked computing structure over the
Internet
Delivery of software applications over the Internet
Cloud computing is more cost-effective
41
Infrastructure as a Service: Computing in the
Cloud
Dropbox
42
Infrastructure as a Service: Virtualization

Using virtualization, one host machine can operate as if it
were several smaller servers
Video
Virtualization can
generate huge savings.
Some studies have
shown that on average,
conventional data centers
run at 15 percent or less
of their maximum
capacity. Data centers
using virtualization
software have increased
utilization to 80 percent or
more
43
Platform as a Service:
Application Development in the Cloud
PaaS facilitate deployment of applications without the cost and complexity of
buying and managing the underlying hardware and software and hosting
capabilities.
PaaS provide all of the facilities required to support the complete life cycle of
building and delivering web applications and services entirely available from
44
the Internet.
Platform as a Service:
Application Development in the Cloud
Azure Video
Azure
Google App
Engine
Force.com video
45
Software-as-a-Service

Software-as-a-service (SaaS) – delivery model
for software in which you pay for software on a
pay-per-use basis instead of buying the software
outright




Use any device anywhere to do anything
Pay a small fee and store files on the Web
Access those files later with your “regular” computer
Makes use of an application service provider
Force.com video dashboards
9-46
Software-as-a-Service
9-47
Consumer Applications in the Cloud

Cloud computing makes it possible for companies to offer Webbased versions of popular personal computer programs

Google Apps - Replace Microsoft office?








Gmail, Google Calendar and Google Docs
Google Calendar
 Share your schedule
Get your calendar from your phone
Get event reminders via email or have text messages sent right to your
mobile phone.
Gmail
Google Docs
Google Reader
 Stay up to date: Google Reader constantly checks your favorite news
sites and blogs for new content.
 Share with your friends: Use Google Reader's built-in public page to
easily share interesting items with other people
 Use it anywhere, for free: Google Reader is free and works in most
modern browsers, without any software to install.
Google Sites
ZohoWriter
Microsoft Office Live
48
Business Applications in the Cloud

The Salesforce Service Cloud allows businesses to
pay as they use services, instead of owning
comparable software. Force.com video customer service
49
Computing in the Cloud with Google Docs



Integrated SaaS suite of Web applications
Free service to customers
Users can access documents from anywhere







Documents
Spreadsheets
Presentations
Folders
Forms
Users can upload existing documents
Users can collaborate with each other
50
Computing in the Cloud with Google Docs
51
Computing in the Cloud with Google Docs
52
Application Programmable Interface (API)

Specifies the programming interfaces required
for software applications to interact with other
applications



Much as a user interface specifies menus, screen
layouts, and other aspects of how people interact with
software applications
APIs are software modules that enables
software applications to interact with each other.
Web services are APIs that Web applications
can request to run over the Internet
Creating New Applications from Data in the Cloud: Mashups
Mashups









Mashups provide a quick way to aggregate business or consumer services
with different data types from multiple sources into integrated applications.
Map-based services integrate business data, such as real estate listings,
with the mashup facilities of Google Maps or other cartographic databases.
Amazon uses mashup technologies to aggregate product descriptions with
partner sites and user profiles, commentaries, and images.
Travel sites, such as Travelocity, Kayak, Matador, and Travature, integrate
standard content (such as airfare search engines, travel guides, maps, and
hotel reviews) with comments, ratings, and images from users.
Mashup contents are continually updated
Creating mashups usually requires significant Web development experience
Mapping mashups are the most popular type of mashup
HousingMaps.com
SpotCrime.com
 SpotCrime displays the locations of criminal incident reports on a Google
Map to illustrate where crime takes place in a neighborhood.
54
Linking Data between Web Applications
Web sites such as MSN, iGoogle, and myYahoo are examples of portal
pages which present information from diverse sources in a unified way
55
The Cloud – Some Current Drawbacks

Users give up the ability to save data to their own
hard drives.

They can’t drag and drop items between
applications.

They can’t receive notifications, such as
appointment reminders, when their browser
window is closed.

In essence they can’t take simultaneous
advantage of the cloud and their own desktop
machine’s capabilities.
56
The Cloud – Security Issues

In cloud computing, thousands of different clients use the
same hardware on a large scale – the key to the efficiency
of the cloud in providing such low cost services.

However, security researchers have demonstrated that
when two programs are running simultaneously on the same
operating system, an attacker can steal data by using an
eavesdropping program to analyze the way those programs
share memory space.

Could this same technique be used in clouds when different
virtual machines (VMs) run on the same server?

Several researchers recently demonstrated that this could in
fact happen utilizing Amazon’s Elastic Compute Cloud.
57
The Cloud – Security Issues (cont’d)

In 2008, a single corrupted bit in messages between servers
used by Amazon’s Simple Storage Service which provides
online data storage by the gigabyte, forced the system to
shut down for several hours.

In 2009, a hacker who correctly guessed the answer to a
Twitter employee’s email security question was able to grab
all the documents in the Google Apps account the employee
used.

Also in 2009, a bug comprised the sharing restrictions
placed on some users’ documents in Google Docs.
Distinctions were erased: anyone with whom you shared
document access could also see documents you shared
with anyone else.

Late in 2009, a million T-Mobile Sidekick smart phones lost
data after a server failure at Danger, a subsidiary of
Microsoft that provided the storage.
58
The Future of the Cloud

Amazon’s cloud customers include the New York
Times and Pfizer.

The City of Los Angeles uses Google Apps for
email and other routine applications.

The White House recently launched
www.apps.gov to encourage federal agencies to
utilize cloud services.
59
The Future of the Cloud (cont’d)





According to the Gartner Group:
 “By 2011, early technology adopters will forgo capital expenditures and
instead purchase 40 percent of their IT infrastructure as a service,”
 “Increased high-speed bandwidth makes it practical to locate
infrastructure at other sites and still receive the same response times."
69 % of America’s Internet users are using some form of Internet-based
computing, such as web-based e-mail or photo storage, according to a study
by Pew Research Center.
By 2013, 12 % of the world software market will be Internet based forms of
SaaS and cloud computing, according to Merrill Lynch.
What impact will a long-term, global recession have on cloud computing?
 A survey by ScanSafe, a SaaS provider of security services, revealed that
78% of IT managers believe economic uncertainty makes SaaS more
appealing.
"A move towards clouds signals a fundamental shift in how we handle
information," writes Stephen Baker in Business Week. "At the most basic
level, it's the computing equivalent of the evolution in electricity a century ago
when farms and businesses shut down their own generators and bought
power instead from efficient. industrial utilities."
60
The Future of the Cloud (cont’d)
The focus of IT innovation has shifted from hardware to software
applications. Many of these applications are going on at a blistering pace,
and cloud computing is going to be a great facilitative technology for a lot
of these people.
Dale Jorgenson, Harvard Economist and
expert on the role of IT in national productivity
Clouds are systems. And with systems, you have to think hard and know
how to deal with issues in that environment. The scale is so much bigger,
and you don’t have the physical control. But we think people should be
optimistic about what we can do here. If we are clever about deploying
cloud computing with a clear-eyed notion of what the risk models are,
maybe we can actually save the economy through technology.
Peter Mell, Leader Cloud Security Team
National Institute of Standards and Technology (NIST)
61
Crowdsourcing and Social Networking

Crowdsourcing (example), when businesses
provide enabling technologies that allow people
(i.e., crowds) – instead of paid employees – to
create, modify, and oversee the development of
products/services Video



Example: Netflix announcement of reward for
technology solution to its movie recommendation
Twitter Sentiment (sentiment analysis)
Social networking site – sites like Myspace,
Facebook, etc where you post information about
yourself, find friends, and so on
Social Networking in Business
• Businesses can use these tools to reach out and market to
potential new customers.
• Many businesses have Facebook sites to market their
product to specific groups on Facebook.
• They can use these tools to support and give added
value to existing customers.
• A software company could have a blog that discusses indepth use of a software product.
• Businesses can use these tools within their company to
communicate between departments and share knowledge.
• Wiki – allows you (as a visitor) to create, edit, change, and
often eliminate content
• A company wiki could be set up as a repository of
expert information.
The Future of Social Technology
 Gartner predicts that by 2016, social
technologies will be integrated with most
business applications.
 Companies should bring together their social
CRM, internal communications and
collaboration, and public social site initiatives
into a coordinated strategy.
64
Social Analytics
 Social analytics describes the process of
measuring, analyzing and interpreting the results of
interactions and associations among people, topics
and ideas
 These interactions may occur on social software applications used in
the workplace, or on the social Web.
 Social analytics is an umbrella term that includes a number of
specialized analysis techniques such as:






social filtering,
social-network analysis,
sentiment analysis video
social-media analytics.
Social network analysis tools are useful for examining social
structure and interdependencies as well as the work patterns of
individuals, groups or organizations.
Social network analysis involves collecting data from multiple
sources, identifying relationships, and evaluating the impact, quality
or effectiveness of a relationship.
Context Aware Computing
 Using information about an end
user’s environment, activities,
connections and preferences to
improve the quality of interaction with
that end user.
 The end user may be a customer, business partner or
employee.
 A contextually aware system anticipates the user's
needs and proactively serves up the most appropriate
and customized content, product or service.
 Gartner predicts that by 2013, more than half of Fortune
500 companies will have context-aware computing
initiatives, and by 2016, one-third of worldwide mobile
consumer marketing will be context-awareness-based
Video vehicle demo
Web 3.0
•Web 3.0 is the vision of the next generation of the Web in
which all of the information available on the Web is woven
together into a single experience.
•The related movement called the Semantic Web is a
collaborative effort to add a layer of meaning to existing
information to reduce the amount of human time spent in
searching and processing that information.
•This potentially could have huge effects on businesses as
simple analysis becomes mechanized, requiring fewer
humans to perform this basic task.
Linking Data in Context:
A Prelude to Web 3.0 and Beyond

Web 3.0 is the name that is being used to
describe emerging trends that allow people and
machines to link information in new way


Personal Web assistants called Agents can make
decisions and take actions based on a user’s
preferences
Many describe Web 3.0 as the rise of the
Semantic Web

Intelligent software tools can read Web pages and
discern useful information from them.
68
Linking Data in Context:
A Prelude to Web 3.0 and Beyond
69
Linking Data in Context:
A Prelude to Web 3.0 and Beyond
70
A Semantic Search Engine: Bing

Microsoft’s Bing search engine attempts to
understand a search query in order to provide
meaningful results


Bing infers meaning from a user’s search query


Bing takes a semantic approach to search
Mt Rushmore is an abbreviation for Mount Rushmore
Provides preview of search results
71
A Semantic Search Engine: Bing
72
A Computational Knowledge Engine:
Wolfram|Alpha


Wolfram|Alpha is a computational knowledge
engine that tries to understand user questions
and calculate their answers
Knowledge base is composed of verified data
from public Web sites, such as the United States
Census Bureau for population and
demographics information
73
A Computational Knowledge Engine:
Wolfram|Alpha
74
Structured Search:
Google Squared


Google Squared adds structure to search results
by providing the results in a table
Users can search for and display additional
attributes by adding a new column and can add
additional items to the category by adding a
new row
75
Structured Search:
Google Squared
76
Data Mining

We hear a lot about information overload

Information overload is often more accurately data
overload

Utilizing vast amounts of data requires smarter
methods for extracting information from data

Bioinformatics and the human genome project is a
prime example

Data mining is the technology
being developed to attack such
problems
Photo by Elvis Santana
77
Data Mining

Data mining relies on advances in machine learning

The goal is to create a program that can
automatically analyze large data sets and decide
what information is most relevant for a particular
problem domain
This distilled information can then be used to
automatically make predictions or to help people
make decisions faster and more accurately

78
Data Mining: Two Models

Predictive models can be used to forecast
unknown or unseen values, based on patterns
determined from known results

For example, from a database of customers who
have already responded to a particular offer, a
model can be built that predicts which prospects
are likeliest to respond to the same offer

Descriptive models describe patterns or
underlying processes in existing data, and are
generally used to create meaningful subgroups
such as demographic clusters
79
Data Mining: Sampling of Business Applications
Video













Market segmentation
Error detection
Evaluation of sales patterns
Credit risk analysis
Ad revenue forecasting
Claims processing
Credit risk analysis
Cross-marketing
Customer profiling
Customer retention
Electronic commerce
Exception reports
Food-service menu analysis













Fraud detection
Government policy setting
Hiring profiles
Market basket analysis
Medical management
Member enrollment
New product development
Pharmaceutical research
Process control
Quality control
Shelf management
Targeted marketing
Warranty analysis
80
Nanotechnology




Ability to manufacture extremely small devices
“Smart” nanodust may be combined with wireless
technologies to provide new environmental monitoring
systems
Current approach – start big and squeeze, press, slice, and
dice to make things small
Nanotechnology approach – start with the smallest element
possible (i.e., atom) and build up
This nanomechanical structure fabricated by a
team of physicists at Boston University consists of
a central silicon beam, 10.7 microns long and 400
nm wide, that bears a paddle-array 500 nm long
and 200 nm wide along each side. This antennalike structure oscillated at 1.49 gigahertz or 1.49
billion times per second, making it the fastest
moving nanostructure yet created.
81
Nanotechnology Impact
Video

Pharmaceuticals


Drug delivery encapsulated in “nano-spheres”
Electronics



Video2
Faster, smaller processors
Immense storage capacities
Material Science


Stronger materials
Super conductivity
Buckyball from Wikipedia
82
Quantum Computing


Many believe that quantum computing systems represent the
next major revolution in computing
Quantum computers will be exponentially faster than today’s
fastest supercomputers
83
Quantum Computing
Video

Quantum computing uses qubits instead of transistors (bits)

A single qubit (utilizing particle spin) stores and processes twice
as much information as a regular bit.

Combining qubits delivers exponential improvement
Two qubits are four times more powerful than two bits
 A 64-qubit computer would theoretically be 264 (=18 billion trillion)
times more powerful than the latest 64-bit computers!
The first prototype quantum computer (with two qubits) was created in
1998



In 2001, Almaden Research Center demonstrated a 7-qubit machine
(using 10 billion billion atoms) that could factor the number 15

In early February 2007, D-Wave Systems, Inc., a privately-held Canadian
firm headquartered near Vancouver, announced: “the world’s first
commercially viable quantum computer”
84
Quantum Computing and Security

RSA (public key) encryption is the basis for
securing data across networks today

The integrity of RSA encryption systems depends
on the practical difficulty of factoring the product
of two large primes

The incredible speed of quantum computers could
render this defense against unauthorized
decryption useless

But the news isn’t all bad, some researchers
believe new encryption methods depending on
characteristics of quantum computing could
provide the solution
85
Biometric Security

Best security is 3-step
1.
2.
3.


What you know (password)
What you have (card of some sort)
Who you are (biometric)
Today’s systems (ATMs for example) use only
the first two
One reason why identity theft is so high
9-86
Integrating Biometrics with Transaction
Processing


TPS – captures events of a transaction
Biometric processing system – captures
information about you, perhaps…





Weight loss
Pregnancy
Use of drugs
Alcohol level
Vitamin deficiencies
9-87
Integrating Biometrics with Transaction
Processing
9-88
Integrating Biometrics with Transaction
Processing



Is this ethical?
Can banks use ATMs and determine if you’ve
been drinking?
How will businesses of the future use biometric
information?


Ethically?
Or otherwise?
9-89
MODULE 4
The Innovators Dilemma
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
90
View the Lecture
The Opportunity and Threat of
Disruptive Technologies
Professor Clayton Christensen
Harvard Business School
91
Group Exercise
1.
Do you see disruptive technologies looming in
your industry?
2.
Are these threats or opportunities?
3.
What are the key characteristics of the
disruptive technologies that your company
faces?
4.
Are the technologies strategically significant?
5.
What are their initial markets?
6.
How could your company address these disruptive
technologies?
92
MODULE 5
Innovation Strategy
BlueCross and BlueShield
of South Carolina
The Rushing Center
Furman University
93
Elements of an Innovation Strategy I

Look for growth outside of, but not too far from, your
core business
 What jobs can existing customers not do?
 Who are your worst customers?
 Where are the barriers that constrain consumption?
94
Elements of an Innovation Strategy II

How can we serve this market?
 Existing solutions are too expensive, too complicated
or do not quite do the job
 The solution is good enough along traditional
dimensions, but superior in dimensions that matter
more to the customer
 The business model has low overhead and high asset
utilization, and therefore allows lower prices or smaller
markets
 Powerful incumbents are not interested in pursuing the
strategy initially
95
Elements of an Innovation Strategy III

Pursue innovative opportunities
 Create specific opportunities
 Focus on patterns rather than numbers


Make “number of zeros” estimates – Guess at impact
Execute and adapt
 Good enough can be great
 Step, don’t leap
 The right kind of failure is success.
Video
96
Group Exercise: Innovation and Organization
1.
Does having an organization that utilizes
specialists contribute to innovation?
2.
Do you think a company could better promote
innovation if it had a group specifically devoted
to innovation?
3.
What are some of the pros and cons of having
such a group?
97
Key Learning Outcomes
When you complete this course you will be able to:
1)
Contrast the evolutionary versus the revolutionary approach to
technological innovation.
2)
Distinguish between sustaining and disruptive technologies and
innovations
3)
Discuss the elements of an innovation strategy.
4)
Give a brief description of the following emerging
technologies/innovations:








Grid (distributed/utility) computing
The Cloud
Crowdsourcing and Social Technology
Web 3.0
Data mining
Nanotechnology
Quantum computing
Biometric Security
98
WRAPPING UP!


Review of our original key
learning outcomes
Questions?
99
References
100



How Breakthroughs Happen, Andrew Hargadon,
Harvard Business School Press, 2003.
“The Change Leader,” Chapter 3 in Management
Challenges for the 21st Century, Peter Drucker,
Harper Business, New York, 2001.
Andrew Hargadon, an interview with the ACM online
journal Ubiquity, at
http://www.acm.org/ubiquity/interviews/v4i30_hargadon.html

Kathy Harris, Article on Gartner Blog found at:
http://blogs.gartner.com/kathy_harris/2009/04/28/innovation-andagility-two-do%E2%80%99s/

“Security in the Ether," David Talbot, MIT Technology
Review, February 2010.
101




The Innovators Dilemma, Clayton Christensen,
HarperBusiness Essentials, 2002 (originally published
in 1997 by the Harvard Business School Press).
The Innovators Solution, Clayton Christensen and
Michael Raynor, Harvard Business School Press,
2003.
"The Rules of Innovation," Clayton Christensen, MIT
Technology Review, June 2002.
"Disruptive Innovation: A New Diagnosis for Health
Care's 'Financial Flu'." Healthcare Financial
Management, John Kenagy and Clayton Christensen,
May 2002.
102