Search results
1 – 10 of over 28000
In this interview, the author of The Innovator’s Dilemma reviews his theory of how businesses are affected by disruptive technology. Most business leaders are aware of…
Abstract
In this interview, the author of The Innovator’s Dilemma reviews his theory of how businesses are affected by disruptive technology. Most business leaders are aware of sustaining technologies, which can be simple incremental improvements or radical, up‐market technology innovations that leap‐frog ahead of the competition. However, they tend to ignore disruptive technologies, which initially provide neither a better product nor acceptable margins. By ignoring disruptive technology, companies forfeit the opportunity to ensure long‐term growth and prosperity. Business leaders must help their organizations develop new business models that utilize the disruptive technologies if they are to survive and evolve over time.
Details
Keywords
Shashi Shekhar Mishra and K.B. Saji
The purpose of this paper is to empirically validate the moderating roles of organizational inertia and project duration in the new high‐tech product development process.
Abstract
Purpose
The purpose of this paper is to empirically validate the moderating roles of organizational inertia and project duration in the new high‐tech product development process.
Design/methodology/approach
The study methodology involved two phases, viz. exploratory and descriptive. The exploratory phase, with the support of a focused literature survey, has resulted in a theoretical framework, which got later validated through the survey based empirical phase.
Findings
The study results suggest that organizational learning and absorptive capacity could trigger a firm's technology acquisition intent, which in turn could increase the firm's propensity to new product commercialization. Contrary to the authors' hypothesis, the study results did not support firm size as an antecedent to the firm's technology acquisition intent. Further, while the project duration is found to negatively moderate the technology acquisition intent to new product commercialization relationship, the study results did not support the moderating effect of organizational inertia on the same.
Practical implications
The study findings suggest that segmenting technology market based on firm size may not be an appropriate marketing strategy; instead organizational factors, viz. organizational learning and absorptive capacity, should be taken as the basis of high‐tech market segmentation. Further, the study has provided the much needed empirical support to the new high‐tech product development process by explaining the moderating effects of organizational inertia and project duration on the relationship between technology acquisition intent and new product commercialization.
Originality/value
The present study is one among those rare empirical investigations that explained the role of organizational variables in the new high‐tech product development process. In addition, the study provides the marketing practitioners the basis of segmentation for high technology markets.
Details
Keywords
The purpose of this paper is to find some feasible measures to solve the problems faced in China's renewable energy development and promote the industrial development of…
Abstract
Purpose
The purpose of this paper is to find some feasible measures to solve the problems faced in China's renewable energy development and promote the industrial development of China's renewable energy.
Design/methodology/approach
The paper summarises the status and studies the problems of China's renewable energy industrial development, and then puts forward some proposals for the industrial development.
Findings
The paper finds that most of China's renewable energy technology is still in the transitional period from research and development to industrial production, and that the renewable energy industrial development needs the establishment of a series of technical experiments and demonstration projects to analyze and investigate the resources, the conversion and market development experience, and then form complete sets of equipment design and manufacturing, cultivation and collection of biomass resources and technology development capabilities, and that regulations should be established to provide a solid foundation for the large‐scale development of China's renewable energy. As a result, some development measures are suggested in the paper.
Originality/value
The paper raises the problems faced in China's renewable energy development, and gives some feasible development measures for the industrial development of China's renewable energy.
Details
Keywords
Yanlan Mei, Ping Gui, Xianfeng Luo, Benbu Liang, Liuliu Fu and Xianrong Zheng
The purpose of this paper is to take advantage of Internet of Things (IoT) for intelligent route programming of crowd emergency evacuation in metro station. It is a novel…
Abstract
Purpose
The purpose of this paper is to take advantage of Internet of Things (IoT) for intelligent route programming of crowd emergency evacuation in metro station. It is a novel approach to ensure the crowd safety and reduce the casualties in the emergency context. An evacuation route programming model is constructed to select a suitable evacuation route and support the emergency decision maker of metro station.
Design/methodology/approach
The IoT technology is employed to collect and screen information, and to construct an expert decision model to support the metro station manager to make decision. As a feasible way to solve the multiple criteria decision-making problem, an improved multi-attributive border approximation area comparison (MABAC) approach is introduced.
Findings
The case study indicates that the model provides valuable suggestions for evacuation route programming and offers practical support for the design of an evacuation route guidance system. Moreover, IoT plays an important role in the process of intelligent route programming of crowd emergency evacuation in metro station. A library has similar structure and crowd characteristics of a metro station, thus the intelligent route programming approach can be applied to the library crowd evacuation.
Originality/value
The highlights of this paper are listed as followings: the accuracy and accessibility of the metro station’s real-time information are improved by integrating IoT technology with the intelligent route programming of crowd emergency evacuation. An improved MABAC approach is introduced to the expert support model. It promotes the applicability and reliability of decision making for emergency evacuation route selection in metro station. It is a novel way to combine the decision-making methods with practice.
Details
Keywords
Roger van Rensburg, Bruce Mellado and Cesar Augusto Marin Tobon
The purpose of this study is to locally develop low-cost wireless mesh networks for reliable data communications to devices that prevent the theft of these devices in…
Abstract
Purpose
The purpose of this study is to locally develop low-cost wireless mesh networks for reliable data communications to devices that prevent the theft of these devices in learning institutions of South Africa.
Design/methodology/approach
A network test-bench was developed where millions of packets were transmitted and logged between interconnected nodes to analyze the quality of the network’s service in a harsh indoor building environment. Similar methodologies in “big data” analysis as found in particle physics were adopted to analyze the network’s performance and reliability.
Findings
The results from statistical analysis reveal the quality of service between multiple asynchronous transmitting nodes in the network and compared with the wireless technology routing protocol to assess coverage in large geographical areas. The mesh network provides stable data communications between nodes with the exception of reliability degradation in some multi-hopping routes. Conclusions are presented to determine whether the underlining mesh network technology will be deployed to protect devices against theft in educational institutions of South Africa.
Research limitations/implications
The anti-theft application will focus on proprietary firmware development with a reputable tablet manufacturer to render the device inoperable. Data communications of devices to the network will be monitored and controlled from a central management system. The electronics embedding the system-on-chip will be redesigned and developed using the guidelines stipulated by the chip manufacturer.
Originality/value
Design and development of low-cost wireless mesh networks to protect tablets against theft in institutions of digitized learning. The work presents performance and reliability metrics of a low-power wireless mesh wireless technology developed in a harsh indoor building environment.
Details
Keywords
This paper, which will be published in two parts in consecutive issues of Circuit World, reproduces a chapter of the recently published book ‘Handbook of Printed Circuit…
Abstract
This paper, which will be published in two parts in consecutive issues of Circuit World, reproduces a chapter of the recently published book ‘Handbook of Printed Circuit Technology: New Processes, New Technologies’, edited by G. Herrmann and K. Egerer and published by Electrochemical Publications Ltd, Port Erin, Isle of Man.
G.M. Giaglis, I. Minis, A. Tatarakis and V. Zeimpekis
Vehicle routing (VR) is critical in successful logistics execution. The emergence of technologies and information systems allowing for seamless mobile and wireless…
Abstract
Vehicle routing (VR) is critical in successful logistics execution. The emergence of technologies and information systems allowing for seamless mobile and wireless connectivity between delivery vehicles and distribution facilities is paving the way for innovative approaches to real‐time VR and distribution management. This paper investigates avenues for building upon recent trends in VR‐related research towards an integrated approach to real‐time distribution management. A review of the advances to‐date in both fields, i.e. the relevant research in the VR problem and the advances in mobile technologies, forms the basis of this investigation. Further to setting requirements, we propose a system architecture for urban distribution and real‐time event‐driven vehicle management.
Details
Keywords
Stephanie Winkler and Sherali Zeadally
The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous…
Abstract
Purpose
The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the protection needed for an Internet user to remain anonymous but suffer from a lack of usability and adoption.
Design/methodology/approach
The authors have selected a few specific online anonymity technologies based on the following criteria: the technology satisfies our full anonymity definition, the technology is currently available for public use and the technology has been academically researched.
Findings
Few anonymity technologies are available for public use that offer the ability for full online anonymity, and these technologies are difficult for the average computer user to operate. Further research is still needed to help determine what the average user wants to see in an anonymity technology as well as ways to help users integrate the technology into their commodity software (such as Web browsers). Future online anonymity technologies should enable the user to decide when, how and with whom their information is shared if it is shared at all with ease and simplicity.
Originality/value
The authors identify, explain and analyze publicly available online anonymity technologies in terms of their usability. The authors identified ways as to how online anonymity technology can be improved to increase public adoption. The authors make pertinent recommendations on how the design and development of online anonymity technology can be improved in the future.
De-gan Zhang, Ya-meng Tang, Yu-ya Cui, Jing-xin Gao, Xiao-huan Liu and Ting Zhang
The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the…
Abstract
Purpose
The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly dynamic network routing reliability problem is a research hotspot to be solved.
Design/methodology/approach
The graph theory is used to model the MANET communication diagram on the highway and propose a new reliable routing method for internet of vehicles based on graph theory.
Findings
The expanded graph theory can help capture the evolution characteristics of the network topology and predetermine the reliable route to promote quality of service (QoS) in the routing process. The program can find the most reliable route from source to the destination from the MANET graph theory.
Originality/value
The good performance of the proposed method is verified and compared with the related algorithms of the literature.
Details