首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
颠覆性技术是具有变革性意义的、会对已有技术产生创新性应用和颠覆性效果的技术。过去 10 年间,一些颠覆性技术已经对国家的科技创新、产业产生了巨大的能效。科学发现与研究的范式经过上千年的演进,共经历了四个阶段,分别是实验观察、理论分析、计算模拟和数据密集型科学研究。这四种范式的融合,共同成为现代科学研究方法的统一体。本文分析了五大类颠覆性信息技术的发展前景,阐述了颠覆性信息技术对计算机体系结构、大数据思维模式以及科研信息化的颠覆性影响。未来随着信息技术与信息化技术将不断发展,使得科研信息化基础设施将成为像水、电、气一样的便利的基础设施,可以随时随地、智能地满足科研人员开展科学研究的需求,人类和机器将会携手取得更加显著的科技突破。  相似文献   

2.
Abstract. Information system (IS) innovation can be defined as a novel organizational application of digital computer and information communication technologies (ICT). This paper discusses how modalities of applying ICT technologies in their form and scope exhibit radical breaks, which are introduced herein as ‘disruptive IS innovations’. This notion of disruptive IS innovation is developed by drawing upon and extending Swanson's (1994) theory of IS innovation as well as the concept of radical innovation. Disruptive innovations strongly influence the future trajectory of the adoption and use of ICT in organizational contexts and make the trajectory deviate from its expected course. In doing so, these disruptive innovations distinctly define what an IS is and how it is deployed in order to address current and future organizational and managerial prerogatives. Such changes are triggered breakthroughs in the capability of ICT that lead to the revision and expansion of associated cognitive models (frames) of computing. Disruptive IS innovations are those that lead to changes in the application of ICT that are both pervasive and radical. The pervasive nature implies that innovative activity spans all innovation subsets of the quad‐core model of IS innovation introduced herein. Innovation types include: IS use and development processes; application architecture and capability; and base technologies. Radical in nature, disruptive is innovations depart in significant ways from existing alternatives and lead to deviation from expected use and diffusion trajectory. This paper demonstrates the importance of a concept of disruptive IS innovation by investigating how changes triggered by internet computing (Lyytinen et al., 1998) meet the conditions of a disruptive IS innovation defined herein. The analysis also affirms both the pervasive and radical nature of internet computing and explains how internet computing has fundamentally transformed the application portfolio, development practices and IS services over time. The analysis demonstrates that, with the concept of disruptive IS innovation, we can fruitfully analyse ‘long’ waves of ICT evolution – an issue that has largely been overlooked in the IS community. On a theoretical plane, the paper advocates the view that we need to look beyond linear, unidirectional, and atomistic concepts of the diffusion of IS innovations where innovative activity takes places in a linear fashion by oscillating between small technological innovations and small organizational innovations. In contrast, IS innovation can exhibit fundamental discontinuity; we need to theoretically grasp such disruptive moments. The recent influx of innovation, spurred by internet‐based technology, offers one such moment.  相似文献   

3.
A general technology switching model (TSM) is proposed to explain why IT users switch from an incumbent technology to a disruptive one. Seven research hypotheses derived from this model are validated using a field survey of feature phone users in Korea. The results indicate that users’ switching intention is determined by their expectations regarding the disruptive technology and dissatisfaction with the incumbent technology. User dissatisfaction is influenced by disconfirmation of previously held beliefs regarding ones incumbent technology and ones expectations for the disruptive technology. Switching cost is revealed not significant in the decision to acquire a disruptive technology.  相似文献   

4.
通过分析三维管网可视化模型的实现方式,构建三维管网空间数据模型,选用Flt三维数据图形格式,提出了基于工程测绘数据、纸质蓝图和DXF格式CAD文件三种形式的三维管网模型自动构建技术;基于Vega Prime的场景漫游开发,可将地上建筑、地下岩层、管网等其它Flt模型引入到系统中,共同驱动,实现大场景城市地下管网的快速建模与三维可视化漫游。  相似文献   

5.
This paper presents the results of a three-year design-based research (DBR) study on the use of social technologies for collaborative construction of shareable artifacts by groups of learners. The study builds on the learning theory of constructionism which assumes that knowledge is better gained when students find this knowledge for themselves while engaging in the making of concrete and public artifacts. In an attempt to infuse elements of constructionism in the use of social technologies, we tasked groups of learners in language learning courses with collaborative construction of an artifact using social technologies. A unique characteristic of our approach is that the process that students adopted and the way technology and context fostered this procedure was analyzed. The cycle of DBR fueled deep insights into the learning processes that emerged through the construction of an artifact, thus deepening our understanding of the multimode and multi-trajectory relationship between theory, artifact construction and social technologies. For sustaining and orchestrating social construction of artifacts by groups of learners, a set of instructional elements emerged, as well as implications for enacting social technology innovations in real-life classrooms.  相似文献   

6.
所谓破坏性创新即颠覆性创新,属于一种商业理念.本文基于计算机辅助翻译生态系统设计,详细分析了破坏性创新的具体表现,即业余翻译者、计算机辅助翻译技术、及其翻译技术、翻译众包等等.研究结果表明,翻译领域的破坏性创新,极有可能突破翻译服务产业既有形态,实现翻译服务行业的长远创新性发展.  相似文献   

7.
网络虚拟化:可感知虚拟机的网络   总被引:2,自引:0,他引:2  
虚拟化网络作为数据中心虚拟化的核心之一,其在数据中心虚拟化的过程中具有不可或缺的作用,对虚拟化数据中心的运营管理影响重大。网络虚拟化是虚拟化技术的重要组成部分,其虚拟机感知能力是新数据中心的必备能力。对软件虚拟交换机和支持虚拟化功能的物理交换机这两种虚拟化网络技术进行详细分析和比较。  相似文献   

8.
我国移动GIS的发展,现阶段应用核心仍然是位置服务——LBS(Location Based Service),LBS系统建设提供了未来空间信息服务蓝图,对我国数字城市建设有着重要意义。本文以上海市科技发展基金项目"空间信息移动用户应用服务系统——GIS核心处理模块"和上海市信息委653工程项目"移动GIS技术创新与软件开发"为支撑,深入研究LBS系统设计与实现技术,包括GIS理论与技术、Java ME技术平台、Mobile SVG规范、XML规范等;设计并实现基于Java ME的LBS系统。  相似文献   

9.
介绍移动网格的研究背景、发展现状,综述移动网格的系统结构以及服务持续连接技术、服务发现技术、任务调度、效应计算等关键技术的研究成果,并给出系统结构设计以及各个关键技术中需要解决的关键问题。最后对移动网格的应用、发展进行展望,提出把移动网格定位为云计算在无线应用领域的延伸。  相似文献   

10.
In the Industry 4.0 era, manufacturers strive to remain competitive by using advanced technologies such as collaborative robots, automated guided vehicles, augmented reality support and smart devices. However, only if these technological advancements are integrated into their system context in a seamless way, they can deliver their full potential to a manufacturing organization. This integration requires a system architecture as a blueprint for positioning and interconnection of the technologies. For this purpose, the HORSE framework, resulting from the HORSE EU H2020 project, has been developed to act as a reference architecture of a cyber-physical system to integrate various Industry 4.0 technologies and support hybrid manufacturing processes, i.e., processes in which human and robotic workers collaborate. The architecture has been created using design science research, based on well-known software engineering frameworks, established manufacturing domain standards and practical industry requirements. The value of a reference architecture is mainly established by application in practice. For this purpose, this paper presents the application and evaluation of the HORSE framework in 10 manufacturing plants across Europe, each with its own characteristics. Through the physical deployment and demonstration, the framework proved its goal to be basis for the well-structured design of an operational smart manufacturing cyber-physical system that provides horizontal, cross-functional management of manufacturing processes and vertical control of heterogeneous technologies in work cells. We report on valuable insights on the difficulties to realize such systems in specific situations. The experiences form the basis for improved adoption, further improvement and extension of the framework. In sum, this paper shows how a reference architecture framework supports the structured application of Industry 4.0 technologies in manufacturing environments that so far have relied on more traditional digital technology.  相似文献   

11.
The purpose of this paper is to analyze how a firm responds to a challenge from a transformational technology that poses a threat to its historical business model. We extend Christensen’s theory of disruptive technologies to undertake this analysis. The paper makes two contributions: the first is to extend theory and the second is to learn from the example of Kodak’s response to digital photography. Our extensions to existing theory include considerations of organizational change, and the culture of the organization. Information technology has the potential to transform industries through the creation of new digital products and services. Kodak’s middle managers, culture and rigid, bureaucratic structure hindered a fast response to new technology which dramatically changed the process of capturing and sharing images. Film is a physical, chemical product, and despite a succession of new CEOs, Kodak’s middle managers were unable to make a transition to think digitally. Kodak has experienced a nearly 80% decline in its workforce, loss of market share, a tumbling stock price, and significant internal turmoil as a result of its failure to take advantage of this new technology.  相似文献   

12.
随着计算机技术的不断发展,对图纸的管理提出了新的要求。介绍了利用可扩展标识语言(XML)技术构建新的图纸管理模式及相关实现技术,系统能完整、准确、迅速地提供图纸管理相关信息和资源的检索、查询、信息更新等功能,实现了电子图纸网络化的平滑交换、信息共享和网上在线审批,克服了传统管理模式的弊端,为图纸信息化建设提供了新的管理模式.  相似文献   

13.

The successful emergence of a disruptive platform in a contested industry is fraught with many challenges. The extant literature focuses on the challenges faced by the established platforms or the growth and inception of regular platforms, highlighting the need for understanding the dilemmas faced by a entrant disruptive platform. Our study sheds light on this phenomenon in an exploratory in-depth case study analysing the emergence of Jio Platform, an India based green-field platform providing mobile and digital services. Our analysis charts the disruptor's actions to navigate challenges posed by the incumbents and its own advanced technology. We demonstrate that the disruptive entrant initiated three strategic actions to overcome its ‘disruptor’s dilemma’: active market development for complement products, using strong complementors as force multipliers and effective usage of framing to secure legitimacy and support. The analysis also highlights how the strategy adopted by Jio evolved over time, as well as the difficulties of mapping this onto the existing understanding of the literature. By focusing on the intersection of the platform and disruptive innovation literature we identify managerial implications and a source of propositions for researchers, investigating the growth of the disruptive platform and its impact on the ecosystem.

  相似文献   

14.
Net present value (NPV) and return on investment (ROI) are commonly used to evaluate investment in new technologies. Sometimes, however, measuring the value of investment in new IT becomes very difficult due to its wide scope of application coupled with embedded options in its adoption. Therefore, comprehensive but easily understandable methodologies are needed to solve the complicated problems resulting from the complexity of new technologies. This paper employs a real option analysis to evaluate RFID adoption in the supply chain. Real options analysis should be a better way to evaluate a disruptive technology like RFID. However, the pure (probabilistic) real option rule characterizes the present value of expected cash flows and the expected costs by a single number, which is not realistic in many cases. To solve the problem, this paper considers the real option rule in a more realistic setting, namely, when the present values of expected cash flows and expected costs are estimated by trapezoidal fuzzy numbers. Specifically, it drew out their means and variance and presented a method of calculating fuzzy real options through numerical value examples of RFID investment assuming the current value of expected cash flow and investment costs using trapezoid fuzzy number fuzzy real options. Since advanced information technology such as RFID has very high risk and options such as change, extension, delay and withdrawal, etc., investment valuation using the real options technique should be done, and in the process, in a more realistic and practical approach, the fuzzy real options model presented in this study is judged to be useful.  相似文献   

15.
In this article, I call for more complicated understandings of the relationship between women and technology, arguing that two interpretive frameworks interfere with our current representations of women and technology: a reliance on what Paul V. Anderson (1998) has called “person-based research” (p. 63) and an either/or framework for thinking about technology. Recent scholarship is firmly grounded in an awareness that technologies are always ideological, that technologies can be used to both oppressive and empowering ends, and that disempowered groups are more likely to be oppressed than empowered by technologies. Although composition has developed a complicated understanding of the ideologies of technology, we have not focused our attention in a systematic way on the perhaps unique relationship of women and technology. I draw on feminist technology theorists’ constructions of technology as always ideological but never predetermined in its meanings for users as a way of beginning this project.  相似文献   

16.
Strategic reasoning about business models is an integral part of service design. In fast moving markets, businesses must be able to recognize and respond strategically to disruptive change. They have to answer questions such as: what are the threats and opportunities in emerging technologies and innovations? How should they target customer groups? Who are their real competitors? How will competitive battles take shape? In this paper we define a strategic modeling framework to help understand and analyze the goals, intentions, roles, and the rationale behind the strategic actions in a business environment. This understanding is necessary in order to improve existing or design new services. The key component of the framework is a strategic business model ontology for representing and analyzing business models and strategies, using the i* agent and goal oriented methodology as a basis. The ontology introduces a strategy layer which reasons about alternative strategies that are realized in the operational layer. The framework is evaluated using a retroactive example of disruptive technology in the telecommunication services sector from the literature.  相似文献   

17.
The literature on disruptive innovation has convincingly explained why many established firms encounter problems under conditions of discontinuous change. Incumbents fail to invest in new technologies that are not demanded by their existing customers. This argument is grounded in resource dependency theory and the associated assumption that existing customers control a firm's internal resource allocation processes. While the problem of disruptive innovation has been convincingly explained, there is still a need for managerial solutions. We argue that a key reason why such solutions are lacking can be found in the asymmetric assumptions made in the original theory of disruptive innovation. Specifically, we identify two related forms of asymmetry. First, the focal (incumbent) firm is treated as a collection of heterogeneous actors with different preferences, incentives and competencies, whereas firms in the surrounding environment are treated as if they contained no such heterogeneity. Second, the theory of disruptive innovation describes incumbents as controlled by their environment, but has failed to recognize that the environment can also be influenced. In this paper we argue that a more symmetric theory of disruptive innovation – i.e. one that treats all similar entities in the same way – opens up for a range of interesting managerial solutions.  相似文献   

18.
Technological innovation process starts with technical discovery of new things or new ways of doing things, i.e., invention. With the commercialization of invention, the term, innovation, takes place instead of invention. The process ends with (duplicative and/or creative) imitation by competitors. It is expected that maximum profits can be achieved in the time interval from commercialization of invention to its imitation because of monopoly power. Therefore, assessing the emergence of invention in accordance with ability for commercialization and resistance for imitation can generate winning innovation intelligence. Besides, for achieving sustainability, disruptive technologies should also be taken into account through evaluation of trendiness of candidate technologies. This study presents a novel assessment process that aims to evaluate and prioritize candidate technologies according to their innovation potentials by considering commercialization, imitation and trendiness factors all together. According to authors’ best knowledge, the technology assessment process presented in this study is the first attempt in the literature that is dedicated to winning innovation intelligence and takes above mentioned factors together into account. Main input resources of the process are patents, scientific publications and market research reports. While trendiness of technologies is evaluated with the help of a fuzzy inference system that combines patent data and publication data, commercial and imitation potentials are evaluated with the help of some marketing indicators and determinants in the proposed assessment process.  相似文献   

19.
Digital transformation has become a central construct in information systems (IS) research. Current conceptualizations largely attribute transformation to intentionality, focus on transformation within a single organization, or assign technology the role of a disruptive agent of change. Likewise, “digital” tends to be a general category of technology, rather than a specific technology enacted in a time and place. Inspired by Schatzkian practice theory and its site ontology, we suggest a contextual viewpoint on digital transformation and call it “relational digital transformation.” We analyzed the change dynamics in the context of taxi dispatch practice in Finland, studying the changing taxi dispatch platforms over years. We investigated five powerful industry actors: two incumbents, two entrants, and a federation of taxi entrepreneurs. We identified events of change in the material arrangements in sites and explain the changes through the process dynamics in the focal practice. We define relational digital transformation as a process through which practice-arrangement bundles of digital technologies evolve over time. This approach assumes the default nature of an industry is to be found in the changing relations between entities rather than in entities themselves. This provides a theoretical extension to the prevailing views of digital transformation in IS literature. It enables studying digital transformation in retrospect without attributing change agency to any entities or technologies a priori. We also contribute to practice-theoretical IS literature by demonstrating how the applicability of practice theoretical analysis extends beyond microphenomena to larger industry-level changes.  相似文献   

20.
Schedules of supply chains are generated with buffers to absorb the effect of disruptive events that could occur during their execution. Schedules can be systematically repaired through specific modifications within buffers by using appropriate decision models that consider the distributed nature of a supply chain. To this aim, information of disruptive events at occurrence or in advance allows decision models to make better decisions. To detect and predict disruptive events along a schedule execution, a service-oriented monitoring subsystem that uses a reference model for defining monitoring models was proposed. This subsystem offers services for collecting execution data of a schedule and environment data, and assessing them to detect/anticipate disruptive events. Because of the distributed nature and the complexity of these services functionalities, this paper presents an agent-based approach for their implementation. This technology allows dealing with supply chain monitoring by structuring monitoring subsystem functionalities as a set of autonomous entities. These entities are able to perform tailored plans created at execution time to concurrently monitor different schedules. A case study is described to try out the implemented prototype system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号