Sunday, September 15, 2019

The Evolution of the Mba

Reading List for Technology and Innovation Strategy: 463 – Management and Strategy, Kellogg School of Management Professor Shane Greenstein Students will be held accountable for all required readings. These must be read ahead of class discussion. Related readings are relevant background. These are included for the interested student. I highly recommend them for a fuller perspective on the topic. Topic 1: Basic Frameworks and Toolkits Topic 1a. Adoption and Evolution Required reading: Geoffrey Moore. Chapters 1 and 2, High Tech Marketing Illusion, High Tech marketing Enlightenment, Crossing the Chasm, Harper Business, 2006. Not in reading packet. Please purchase book. ) Rosenberg, Nathan, â€Å"Innovation’s Uncertain Terrain. † McKinsey Quarterly, pp. 170-185, Issue 3, 1995. In class video: Interview with Dan Bricklin, founder of Visicalc, from Triumph of the Nerds, An Irreverent History of the PC Industry, By Bob Cringely. Ambrose Video, RM Associates. 1996 Relat ed reading: Geoffrey Moore, To Succeed in the Long Term, Focus on the Middle Term, Harvard Business Review, July 2007. Wolter Lemstra, Vic Hayes and John Groenewegen, â€Å"Crossing the Chasm: the Apple AirPort. † Chapter 4 of The Innovation Journey of Wi-Fi: The Road o Global Success, Cambridge Press. Greenstein, â€Å"Virulent Word of Mouse. † And â€Å"An Earful about Zvi’s Email. † http://www. kellogg. northwestern. edu/faculty/greenstein/images/columns-older. html â€Å"Early Adopter, Enthusiast or Pioneer? A User’s guide to Technology Lingo. † http://virulentwordofmouse. wordpress. com/ 1b: Capturing value in value chains: the basics. Greg Linden, Kenneth L. Kraemer, and Jason Dedrick, â€Å"Who Captures Value from innovation in global value chains? A Study of the iPod and Notebook PC. Industrial and Corporate Change, June, 2009. Greg Linden, Kenneth L.Kraemer, and Jason Dedrick, The Distribution of Value in the Mobile Phone Supply Ch ain Related reading Francesco Zirpoli and Markus C. Becker, â€Å"What Happens When you Outsource too Much? † SMR 374, Winter 2011. Topic 1c: Attackers’ advantage during diffusion Required reading: â€Å"The Crisis at Encyclopeadia Britannica,† Kellogg Teaching Case, Revised version, August, 2009. Joseph Bower and Clayton Christensen, â€Å"Disruptive Technologies: Catching the Wave† in (Ed) John Seely Brown, Seeing Differently: Insights on Innovation, Harvard Business Review Book, 1997See class page on Blackboard, under the Assignment folder. Related reading: John Hagel III, John Seeley Brown, Lang Davison, â€Å"Shaping Strategy in a World of Constant Disruption,† Harvard Business Review, October 2008. Greenstein, â€Å"Creative Destruction and Deconstruction. † http://virulentwordofmouse. wordpress. com/, October, 2004. Topic 1d: Installed Base and Standards Required Reading: Carl Shapiro and Hal Varian, Information Rules, Chapters 5, 6, 7 & 8. Recognizing Lock-in, Managing Lock-in, Networks and Positive Feedback, Cooperation and Compatibility, Harvard Business School Press, 1998. Not in case packet. Please purchase book. ) In class video: Interview with the founders of McAfee Associates, from Nerds 2. 0. 1, A Brief History of the Internet, Bob Cringely, PBS Home Video, 1998. Related Reading: â€Å"Bleeding Edge Mass Market Standards,† and â€Å"Bird Watching for Nerds: Splintering the Internet,† and â€Å"The Grocery Scanner and Bar Code Economy,† http://virulentwordofmouse. wordpress. com/ Topic 1e: Attackers Advantage versus Installed Base: Microsoft and Netscape Required Reading: Browser Wars, 1994-98, HBS Case 9-798-094 In class video:Interview with Andreeson, Clark, Gates, Ballmer, Metcalfe, from Nerds 2. 0. 1, A Brief History of the Internet, Bob Cringely, PBS Home Video, 1998. Related Reading: Timothy Bresnahan and Pai-Ling Yin, â€Å"Standard Setting in Markets: The Browser Wars,† in Greenstein and Stango, Standards and Public Policy, Cambridge University Press, pp. 18-59. See class page on Blackboard, under the Assignment folder. Greenstein, â€Å"The Long Arc Behind Bill Gates’ Wealth, Part I and Part II,† http://virulentwordofmouse. wordpress. com/ Topic 2: Systems and Platforms Topic 2a. Classic frameworks and new approachesRequired reading: Andrei Hagiu, Note on Multi-sided Platforms: Economic Foundations and Strategy, HBS Case, 9-709-484 Related reading: Michael Cusumano and Annabelle Gawer, Elements of Platform Leadership, Sloan Management Review. Spring 2002, (43) 3, pp 51- 58. â€Å"Gateway Economics,† and â€Å"The Lexicon of Network Economics,† and â€Å"Managing Complements,† http://virulentwordofmouse. wordpress. com/ Topic 2b: Developing a multi-sided platform at Google Required reading: Google Inc, HBS Case 9-910-036 In class video: Hal Varian, Introduction to the Google Ad Auction, Made for YouTube. Related Reading:Andrei Hagiu and David Yoffie, â€Å"What’s your Google Strategy? † Harvard Business Review. R0904. Greenstein, â€Å"A Big Payoff,† â€Å"The Next Chapter at Google,† and â€Å"Did one invention lead to the decline of newspapers? † http://virulentwordofmouse. wordpress. com/ Topic 2c: Entrepreneurial product development for a platform Required reading: â€Å"Developing an App for That,† HBS Case 9-711-415, August 2, 2011. Related reading: Bhide, Amar (1996). â€Å"The Questions Every Entrepreneur Must Answer,† Harvard Business Review, HBS Reprint 96603-PDF-ENG â€Å"Google’s Android: Will it shake up the Wireless Industry in 2009 and Beyond? Case SM-176. â€Å"Gaming Structure,† http://virulentwordofmouse. wordpress. com/ Topic 3: Commercialization Topic 3a: Commercialization Strategy Required reading: Joshua Gans and Scott Stern, â€Å"The Product Market and the Market for Ideas: Commercialization Strategies for Technology Entrepreneurs. † Research Policy, In class video: Interview with Rod Cannon, in Triumph of the Nerds by Bob Cringely. 1996 Related reading: Seabrook, J. , â€Å"The Flash of Genius,† The New Yorker. Greenstein, â€Å"Imitation Happens,† http://virulentwordofmouse. wordpress. com/ Topic 3b: Merger for knowledge transfer: Cisco SystemsRequired reading: â€Å"Cisco: Early if Not Elegant (A) and (B), Darden Case, UV 1632. Recommended reading: Bunnell and Brate, Making the Cisco Connection, Chapter 6, The Benevolent Predator. Geoffrey A. Moore, 2008, Dealing with Darwin, How Great Companies Innovate at Every Phase of Their Evolution, Penguin Group, pp 100-109, 159-167, and 181 -191 Ironport, Stanford GSB Case, E-334. Topic 3c: Commercialization experiments: Markets for intellectual property Required Reading: â€Å"Intellectual Ventures,† Case 9-710-423, Related reading: Nathan Myhrvold, Funding Eureka! HBR article, March, 2010. â€Å"When Pate nts Attack. † Originally aired on WBEZ/This American Life on 7. 22. 2011. http://www. thisamericanlife. org/radio-archives/episode/441/when-patents-attack Davis, Lee (2008). â€Å"Licensing Strategies of the New Intellectual Property Vendors,† California Management Review Greenstein, â€Å"Smart Phone patents and Platform Wars,† http://virulentwordofmouse. wordpress. com/ Topic 3d. Commercialization Experiments: Online without intellectual property. Required reading: RadioHead: Music at your own price (A) and (B), Case 9-508-110, 9-508-111Related reading: â€Å"Pandora Radio: Fire Unprofitable customers? † HBS case 5-610-078, April 2011. â€Å"Digitization and Value creation,† http://virulentwordofmouse. wordpress. com/ Topic 4: Firm boundary and scope Topic 4a: Extending functionality: Intel Required reading: â€Å"Intel Centrino in 2007: A new Platform Strategy for Growth. † SM-156. Related reading: Shane Greenstein â€Å"Economic Experime nts and the Development of Wi-Fi. † Edited by Steven Kahl, Michael Cusumano, and Brian Silverman. Advances in Strategic Managements, V 29. Chapter 1, pp. 3-33. Emerald Group Publishing; Bingley, UK.Greenstein, February 2007, â€Å"The High Costs of a Cheap Lesson,† http://virulentwordofmouse. wordpress. com/ 4b: Climbing the value chain Required reading Flextronics International, LTD, 9-604-063, April, 2010. HTC Corp. in 2012, HBS case 9-712-423, September, 2012. Related reading Greenstein, â€Å"Outsourcing and Two Views for Climbing the Value Chain,† http://virulentwordofmouse. wordpress. com/ Topic 4c: User-contributed content Required Reading: â€Å"Wikipedia in the Spotlight,† Kellogg Teaching Case. August, 2009. Recommended Reading: â€Å"Wagging Wikipedia’s Long Tail. â€Å"Another Venerable Establishment Surrenders to Wikipedia,† and â€Å"The Range of Linus’ Law. † http://virulentwordofmouse. wordpress. com/ Topic 4d: Entrepreneurship and user participation Required reading: â€Å"Triumph of the Commons: Wikia and the Commercialization of Open Source Communities in 2009. † Kellogg Teaching case, October, 2009. Yelp, Case 9-709-412 MentorMob and the Reinvention of Learning, August, 2011. Related Reading: Eric Raymond, The Cathedral and the Bazaar, First Monday. www. firstmonday. dk See class page on Blackboard, under the Assignment folder. Foursquare, HBS Case 9-711-418

Saturday, September 14, 2019

Coca Cola Swot Analysis

Company background: The Coca cola company is now a largest soft drink company in the world. Coca cola became the largest manufacturer, distributor, and marketer of non-alcoholic beverage concentrates and syrups which operate in more than 200 countries. Coca cola was invented on May 1886 by Dr. John Stith Pemberton in Jaco’s Pharmacy in Atlanta, Georgia. The name Coca cola was suggested by Pemberton’s book keeper, Frank Robinson. He penned the name Coca cola in the flowing script that is famous today. Strengths: Coca cola has been a complex part of the American culture for over a century. The images of the products has landed in many broadbands, and there pictures were taken deeply in the heart. The image is printed on posters, T-shirts, and hats. This is the most successful brand popularize in the world. In 2006, Coca cola is become one of the leading brand in globe top 100 brands. â€Å"Enjoy more than 685 moillion times a day around the world Coca cola stands as a smple, yet powerful symbol of quality and environment†(Allen,1995). Today, almost 230 kinds of products were produced in more than 200 countries, and the company is never give up to extend new market. Coca cola has the most workable bottling system, which allow the products packed to can, plastic bottles and glass bottles, that means their coke can meet different request for different consumers. In addtionally, Coca cola allow their authorised the local company to sell the products, it is a way to save time and money to built the transport network. Apart from the above strengths, Coca cola has a huge market share, which is about 44%, is higher than it’s competitor—Pepsi. This means people are more likely to buy products from Coca cola. For Coca cola, the market share rate is a important and useful power to grow and can help the company earn more revenue. Weakness: Health is an important issue in 21st century. As we know, coke contains high sugar and caffeine content. In Sempeteber 2006, the company received a report from Center for Science and Environment (CSE), which shows their products included chemicals could causes osteoporosis, damage the reproductive system and cancers (Scribd, 2006). This report will put the Coca cola in a very negative place, with any help for their brand and products. Due to 2006, cash which invested in operating activities was decreased in 7% compared with 2005. Net cash provide by operating activities is also less than the previous year. With a series of problems, their market share is decreasing during the year. This may cause financial problesm such as not enough money to invest in newly growing market. Coke is a product, it should be sold by retailers. However, some larege retailers have exclusive contracts with Pepsi and do not stock Coca cola’s products, such as KFC. This is an abuse, and may cause market share loss. These retailers like KFC are shopped all over the world, over two million dolars loss due to this reason. Oppotunities: Nowadays, from American south coast to a small country in China, from Moscow to Sydney, buy a bottle of Coca cola is the most easiest thing. Although Coca cola is a worldwide brand, it’s products are sold around the world, there still have some markets need investment. Because there is no current brand could compete with them, expansion into third world countries is the easiset than ever before. The population in thrid countries is two times more than developed countries. This is a big market for Coca cola to improve and these markets can make the revenue growing like a rocket. Because bottle water can increasing health concems, bottle water market is becoming a fast-growing market in these years. In 2006, approximately 15. 6 million dolars were earned in US bottle water market. In the bottle water market, flavoured water is a part which growing by about 10 billion dolars annually. Coca cola could use their market leader position to invest in flavored water market to take advantage of growing demand. Young people are more likely to choose coke, especially in Lartin American countries and Asia countries, more and more young people are contribute to their revenue. Ohterwise, carbonated beverages are very compatible with American fast food culture, therefore there are many retailers are shopped with Coca cola. Threats: Competition between each company is a big problem. The company faces competition in beverages market from local firm as well as globe players. Also, the company faces various competition nonalcoholic beverages such as juice, friut drinks. In many countries which Coca cola sell it’s products, there should be their primary competitior—Pepsi. Other competitor such as Kraft Foods, Nestle. Competitive factors impacting the company’s business include pricing, advertising, sales promotion programs, brand and trademark development and protection. There competition could impact Coca cola’s market share and revenue growth rate. For some political reasons, middle east countries boycotting US brands, which will influence Coca cola’s globe market plan and revenue. Consumers are start to look the better drinks whcih will not cause health problems. This has led to a decrease in the comsumption of carbonated and other sweetened beverages. Moreover, the US is the company’s core market, Coca cola already expect its performance in the region to be sluggish during 2007. Coca cola’s revenue could be adversely affected by a slowdown in the carbonated beverage market. Target consumer: Coca-Cola main objectives are to supply everyone their favourite drink and to satisfy the consumer needs and wants. Coca-Cola second main objectives are to provide profit to the shareholders and increase the market share. Target consumer is a set of buyers sharing common needs or characteristics that the company decides to serve. The company's beverages are generally for all consumers. However, there are some brands, which target specific consumers. For example, Coca-Cola's diet soft drinks are targeted at consumers who are older in age, between the years of 25 and 39. PowerAde sports water target those who are fit, healthy and do sport. Winnie the Pooh sipper cap Juice Drink target children between the ages 5-12. This type of market approach refers to market segmentation. The Coca-Cola Company when advertising, has a primary target market of those who are 13-24, and a secondary market of 10-39. The Coca-Cola Company's products include beverage concentrates and syrups, with the main product being finished beverages. The business has over 300 brands of beverages around the world with the main ones being Coke, Fanta, Lift, Sprite, Frutopia 100% Fruit Juice, and PowerAde. The Coca-Cola Company packages its beverages into plastic bottles of sizes 2 litres, 1. 25 litres, 600mL and 300mL. These are also available in aluminium cans of 375mL. Coca-Cola is the most well known trademark, recognised by 94 per cent of the world's population. The business is very successful and holds a very good reputation. Allen J. 1995, Coca cola SWOT analysis, viewed 23 March 2010, http://www. coca-cola. com. Scribd 2006, Scribd, viewed 21 March 2010,http://www. scribd. com/doc/9995196/Swot-Analysis-of-Coca-Cola. http://en. wikipedia. org/wiki/coca-cola accessed 31 October 2009.

Friday, September 13, 2019

Risk Management (article Critique) Case Study Example | Topics and Well Written Essays - 1000 words

Risk Management (article Critique) - Case Study Example CITS worked towards two different options of achieving the MIS system - procuring a ready to deploy software and in-house development of the MIS software from scratch. After assessment of pros & cons and the cost benefit analysis CITS decided to develop the MIS system in-house. However, this decision caused trouble times due to attrition of key people and lack of specialists. The project was finally completed with the help of final year students and an internal mentor who took the responsibility as part time assignment. The article finally claims that the MIS system was deployed successfully. The fundamental problem in this case study was lack of appropriate Risk Management. The analysis of the two modes of MIS deployment presented on pages 45 & 46 (Rodrigues. and Govinda. 2003. 45-46) is not promising because it doesn't take into account any risk analysis. The decision of developing in-house was taken purely on financial benefits which again may not have considered the enormous hidden costs in the in-house development process. Field & Keller (1998: 117) presented that after the risks are assessed and identified, the actions that can be taken are risk avoidance, risk reduction, risk transference, contingency planning and risk acceptance. The project plan of CITS largely ignored these aspects of risk mitigation and hence faced serious obstructions to the project due to attrition of key people and reluctance of end users in the data entry process. The documentation by CITS doesn't even include the project risk management part of the overall planning (Rodrigues. and Govinda. 2003. 46). Hence, the CITS was greeted with multiple surprises especially due to the people specific issues. The attrition of the system analyst at a time when the decision of developing the MIS in-house was taken recently must have left the CITS with only the high level design documents. At this stage a lecturer was engaged to take the project further who later on utilized his final year students to carry out the coding. The author hereb y argues that it is very unlikely that the low level designs and coding standards were established effectively for the project and hence the students might have used ready to compile codes that are available on the Internet. From the author's perspective, a project managed in this mode might have lived with high risks related to bugs, quality, data security, etc. (although not mentioned specifically in the case study). Hence, the Project Manager might have taken the route of risk acceptance given that he was able to develop & execute a contingency plan that largely worked for him. Comparing with the IS checklist by Cadle & Yeates (2004: 257-261), it appears that many aspects of the checklist were not planned by CITS. For example, the acceptance criteria, developer's skills, architecture aspects, testing methodologies, staffing requirements, etc, were not analyzed effectively in the MIS strategic plan documented by CITS. The entire plan

Thursday, September 12, 2019

Organizational Behaviour 2 Essay Example | Topics and Well Written Essays - 3000 words

Organizational Behaviour 2 - Essay Example The role of Patch Adams was portrayed by one of the most revered actors of contemporary times, Robin Williams, known for his wit and genuine love for humor. The modes of communication used in the movie would be discussed and evaluated in the light of theories of both verbal and nonverbal communication, used as an integral and critical part of the healing process of patients. The development of language as a means of communication has enhanced the growth of interrelationships with people all over the world. Language facilitated the replacement and expression of behavior with concrete and concise messages. There is little doubt that language – the ability to communicate with words, whether in speech, writing, or signing – is one of the attributes that make one human, perhaps the most basic one. In any organized system, whether in business, politics, the academe, or in health care, the influence of theoretical perspectives in communication has evolved from a simple framework to the complex structure we have today. The development of communication theories opened a whole spectrum of information which enhanced the interaction and interrelationships among people from diverse walks of life. According to Delaune & Ladner (2006, 270), communication is the â€Å"process of transmitting thoughts, feelings, facts, and other information† through verbal or non-verbal means. Verbal messages are messages communicated with the use of words and language. These messages can either be spoken or written. Non verbal communication, on the other hand, is the process of transmitting messages without words, that is, through body language (Delaune & Ladner, 2006, 275). Non verbal communication is usually understood as the process of communication through sending and receiving wordless messages. In another study conducted by Stuart & Laraia (2001), communication was described as having prominent

Wednesday, September 11, 2019

Critical thinking and logic Essay Example | Topics and Well Written Essays - 250 words

Critical thinking and logic - Essay Example gh studies and involvement among many people nowadays, ethics is now being linked to critical thinking for people to assess more intensively and extensively what is morally right and what is not. The principles and rules of critical thinking are applicable to ethical reasoning because they encourage people to question and not simply accept doctrines or beliefs. According to Richard Paul, â€Å"the integration of principles with purported facts within a particular perspective produces the judgment that this or that act is morally right or wrong†. A person who is given an ethical view can use critical thinking to verify its global acceptance and correctness. On the other hand, a person who is presented with a belief and does not apply critical thinking endangers himself of being manipulated. If everyone followed the rules and guidelines of logic, there would still be a reason for ethical decision-making. Elder and Paul claim that â€Å"developing one’s ethical reasoning abilities is crucial because there is in human nature a strong tendency toward egotism, prejudice, self-justification, and self-deception†. Therefore, it is not enough that a person is able to think critically but s/he must have an ethical foundation from which to base ethical reasoning using critical thinking. Paul, Richard. (1993). Ethics Without Indoctrination. â€Å"Critical Thinking: What Every Student Needs to Survive in a Rapidly Changing World. The Critical Thinking

Tuesday, September 10, 2019

Time Management Essay Example | Topics and Well Written Essays - 1000 words - 1

Time Management - Essay Example There are some general rules for pacing that are very valuable, but there are also necessary modifications to be made when there is a diverse group of students with varying levels of need. 1. Develop Awareness of Your Own Teaching Tempo: "We can learn to generate interest and enthusiasm by adjusting effectively or create a calming effete by adjusting our own personal pace in the classroom" (Jones & Jones, 2004, p288). These authors suggest videotaping or recording yourself during class to monitor your own behavior and then later replay it and evaluate your actions. While this is one excellent tool, quite often teachers can be too hard on themselves or not hard enough depending on their own ego structure and make incorrect decisions based on highly personal rather than objective criteria. It is recommended that the teacher pick a peer that they trust and respect to evaluate the tape to ensure a more well rounded set of inputs. Once the teacher has established the correct pace for the classroom they will be much more comfortable in class and able to quickly recognize those times when they may have to speed up or slow down that pace, appropriate to the needs of the students and the material being covered. 2. Watch for Non-Verbal Cues: During the course of a lesson if the class becomes too quite or too boisterous that may be a clue that the students are becoming bored. If there are glazed eyes all around or if students are fidgeting in their seats and tapping pencils; rather than remonstrate them for this undesirable behavior it is wise to take the time to listen to yourself, stop and break the pace that has caused this. "Wake people up by giving them a 2 minute test on last weeks vocabulary" (TEFL, 2007), this helps to enliven the group, perhaps agitate them a bit and cause them to pay more attention during the lesson

Monday, September 9, 2019

Juvenile Justice- Juvenile Interviews-repost Assignment

Juvenile Justice- Juvenile Interviews-repost - Assignment Example ply means that juvenile offenders should be not except from being questioned, especially when there is a need to verify circumstances that led to the offense. As such, given the same prerogative of seeking the legal assistance of lawyers, the juveniles could wait for their appointed or assigned legal counsel before any statements are provided to the interviewing officer. Concurrently, in terms of determining who should be present during the interview, I also believe that the juvenile’s lawyer is of crucial importance, in addition to the interviewer. For some juveniles who have strong attachments to their parents, I also assert that if and when the juvenile asks for the presence of parents, the request could be granted. Parents have provided holistic support to their children in every aspect of their lives. As such, they could be sought to provide much needed support through their presence in this challenging situation. Of course, the parents’ presence would only mean th at the physical support is needed; and by no means should they attempt to interfere with the