An explosion of new technologies is creating new winners and losers in nearly every industry. You only have to look at the changing fortunes of Apple and Hewlett-Packard in the personal computer/tablet arena over the last decade to see how innovation can propel one company into superstar status, while another becomes irrelevant in the same market space.
So how can companies gain and hold an edge in technology innovation? In an engagement with a major global manufacturer, Cisco IBSG identified three key factors in the product innovation process that companies must clearly understand and be able to orchestrate:
- Technology Strategy: Develop a technology strategy based on internal and external scans of rapidly emerging capabilities. These should include an assessment of each technology’s ability to disrupt, its stage of incubation, differentiating factors, competitive alternatives, and identification of platform choices. Developing a business and technology architecture for how the technology fits into your company’s platform portfolio is a critical step in this analysis.
- Ecosystem Management: Arrange and manage ecosystem partners by assessing the need for technologies to perform certain functions that extend beyond your own internal capabilities, such as the ability to connect to a broader environment. You will need to understand existing and future profit pools to validate partner choices. For example, providing “smart services,” such as analytics, can extend a product’s useful life and be the source of long-term profitability, for both you and the ecosystem partners that deliver them.
- Market Interactions: Prepare and execute detailed plans for managing market interactions, from initial introduction through full-scale market management. This includes an ongoing analysis of customer reactions, portfolio management, media communications, and potential competitors.
Read More »
Tags: Cisco, Disruption, disruptive technologies, ecosystem, global, IBSG, innovation, interactions, management, manufacturer, market, partners, process, product, strategy, technology, technology scan
Today, Keith Goodwin, SVP of Cisco’s Worldwide Partner Organization, is announcing his retirement after 13 years with Cisco and 38 years in the IT industry. Keith has been a strong leader, colleague, and friend to so many partners during his time at Cisco.
Starting on August 1, SVP Bruce Klein will become the new leader of Cisco’s Worldwide Partner Organization.
Read more details as EVP Rob Lloyd blogs about Keith’s career, Bruce’s leadership style, and our commitment to our partner-centric strategy. Read More »
Tags: Bruce Klein, Cisco, keith goodwin, organization, partners, worldwide, WWPO
Imagine a world where businesses can increase efficiency, reduce costs, and securely share and store data across multiple networks, regardless of location. Until a few years ago, this concept seemed unattainable to most.
Fast-forward to 2012, and just about every company in the industry is working to make the cloud a part of its business model. Organizations are beginning to see the cloud as a long-term industry transition in the same way that client/server computing was a transition from the mainframe era.
Cloud is the next step in the evolution of the Internet. And that evolution is happening now. The cloud is fundamentally changing the way people and businesses consume services.
Early discussions have focused primarily on the different types of clouds leaving businesses wondering what option is best for them. In reality, it can take several types of clouds to solve a variety of business challenges. We’re moving to an interconnected world of many clouds – where users want to experience cloud services anywhere, anytime, on any device – and businesses want IT as a service.
Clouds offer compelling economics – reducing CapEx and OpEx, sharing of cloud assets, and dynamic, on-demand delivery of services. They enable flexible business models that allow services to be launched more rapidly, with greater efficiency and more scalability, regardless of the geography or size of business.
Curious on what “cloud formation” is right for you? Read More »
Tags: capex, Cisco, ciscops12, cloud, cloud formation, opex, partners, services, Wendy Bahr
Before we could write, film videos, watch TV, or tweet, stories served as the way to share information and convey data.
But even in the digital age with information coming at us from every angle every second, it’s the power of stories that compel us to buy, that make our customers trust us, and it’s how the best marketers convey information.
Cisco’s new Built for the Network campaign is helping us to reach out to customers through videos and success stories that we’re currently rolling out via television, print, digital, mobile and social media. These stories showcase the power of Cisco and its partners and we want to ensure that you have the tools to spread the word, through this and your own campaigns. I would also like you to participate and will show you how.
First, watch the most recently launched commercial.
Keep reading for details on how to participate in the campaign and reach more customers. (It could be your business featured in an upcoming commercial or video.)
Read More »
Tags: amanda jobbins, built for the network, campaign, CIO, data deluge, marketing, partners
Have you heard the news? 3D versions of the Star Wars movies will begin rolling out in 2012. I know some sci-fi geeks…ah, friends…who can hardly wait.
Me, I prefer Force 3. I like to think of them as the living, breathing version of Star Wars. No Darth Vaders, no jittery C-3POs, but plenty of Luke Skywalkers—regular “heroes” intent on designing technology solutions with a relentless focus on meeting their customers’ business needs.
But what really grabs my attention in their video below is that Force 3 gets it, they truly do. As a thriving Cisco Master Partner, pushing products isn’t on their intergalactic radar— it’s not even within low-earth orbit.
So if it’s not selling gear, what’s Force 3’s strategy for success? Read More »
Tags: Cisco, federal, healthcare, partners, security