S-Curve-Case Study-Sessions 18&19
S-Curve-Case Study-Sessions 18&19
S-Curve-Case Study-Sessions 18&19
INSIDE
What is Java? What is the WEB PC? What is the Attack? Where are Java and the WEB PC on
Their “S” curves? What is the New Performance Limit? How is Java Riding the “S” Curve?
What are the Diffusion Prospects for Java? How Will the Defender Defend? What about the
Problem of Know-How? What about Thrashing? Will Java and WEB PC Complete a Suc-
cessful Attack? When Should We Jump?
INTRODUCTION
Through the latter half of the 1990s the management of business is be-
coming increasingly complex and difficult as virulent hyper-competition
accelerates. Industry turbulence is being driven by factors such as global-
ization of competition, slow growth in developed countries, changing
customer demographics and value expectations, bypass competition
from suppliers, relentless cost pressures, and the advent of new electron-
ic distribution and sales channels. All of these factors are conspiring to
expedite the need to reshape and renew all aspects of company value
chains. As never before, it is now urgent to concurrently improve the ef-
ficiency of all business functions and processes while personalizing ser-
vice to the customer.
Information technology is critical to addressing these challenges. All
typical business functions — such as inventory management, logistics,
sales management, store operations, financial management, and human
resources management — can be made more efficient and effective by
redesigning each function to take full advantage of existing and emerg-
ing information technologies. Dramatically improved information move-
ment and management technologies
are increasingly the means to achiev-
ing improved business ends (cus- PAYOFF IDEA
tomer satisfaction, market share, and The primary tool of technology substitu-
tion and diffusion theory is the “S” curve.
revenue growth). Electronic com- In this article, the author illustrates the
merce, in particular (as personified use of “S” curves through a case study of
by multimedia, the Internet, kiosks, Java’s substitution attack on traditional
* r PC architecture.
Auerbach Publications
© 1999 CRC Press LLC
interactive television, and EDI), is becoming the new mandatory infor-
mation movement and management means of touching, retaining, and
selling to extremely fickle customers.
While information technology provides sophisticated tools to over-
come the challenges of our times and configure a new, vibrant, and suc-
cessful organization, it also demands making procurement decisions
under escalating uncertainty and risk. There are more information tech-
nologies, vendors, and choices than ever before. No sooner is a decision
made than a new technology is announced that apparently makes yester-
day’s champion obsolete. Users and technologists insist that the new
challenger must be adopted immediately if the company is to remain
competitive. Systems integration becomes a nightmare as the system con-
figurations continue to mutate.
So, information technology presents the IT executive with a pressing
dilemma. On one hand, it certainly is a significant means to winning the
hyper-competitive wars of the late 1990s. On the other hand, IT itself is
undergoing such rapid change and is presenting such discontinuities that
it is increasingly difficult to make selection decisions. What can be done
to increase understanding of the evolution of information technologies
so that the addition of new technologies and the retirement of dated
technologies can be done in an orderly manner? Can the strategic logic
of technological change be understood so that the apparent chaos can be
mastered and optimum decisions be made as to what will and will not
be in IT portfolios? Is there a way to know when it is the ideal time to
adopt a new technology?
The unanimous answer to these questions is “yes.” A discipline of
study called technology substitution and diffusion provides a theory of
how technologies substitute for each other. Embedded in the theory are
tools called “S” curves that can be used to assist in making the difficult
decisions. Understanding and applying technology substitution and dif-
fusion methods are critical to making the best possible judgments regard-
ing if and when to jump between information technologies.
By prudently applying technology substitution and diffusion theory,
IT executives can take command of the technology change conundrum
and alleviate the ceaseless procurement turmoil. Consider the following
example.
One of the most exciting and hyped technologies to come along (in
an industry that swims in exciting and hyped technologies) is the pro-
gramming language called Java from Sun Systems. Mr. Eric Schmidt, for-
merly Chief Technology Officer of Sun Systems, said, “Java is bigger than
the Internet.” A few months later, Mr. Steven Ballmer, Executive Vice
President of Microsoft, was compelled to say in an interview, “The notion
that the PC is dead is the topic of crazy minds.” What is going on here?
This is the beginning of an instance of technology substitution and dif-
fusion. Java and a related technology called the WEB or network PC are
attacking the defending fat client PC technology based on the products
of Microsoft and Intel (often referred to as the WINTEL architecture or fat
PC). This attack is of interest to the IT executive because, while the Ja-
va/WEB PC environment alleges many advantages over the incumbent,
it is only at the beginning of its “S” curve. Nevertheless, IT executives are
constantly reading about Java and are coming under pressure to intro-
duce it. What is the strategic situation?
An “S” curve analysis of Java will be performed. This will illustrate
how “S” curves can be used to structure the technology substitution and
diffusion debate within a company and provide needed insights so that
optimum (as opposed to emotional) decisions can be made. A tight tech-
nology substitution and diffusion analysis of Java will be done by asking
a series of “S” curve questions and answering them. Although the related
technology of WEB PC is not necessary in order to use Java, it will be in-
cluded in the analysis. Java alone does not obsolete the fat PC, but Java
plus the WEB PC do.
Q4. WHERE ARE JAVA AND THE WEB PC ON THEIR “S” CURVES? WHAT IS THE NEW
PERFORMANCE LIMIT?
Both technologies are in the pioneer plus stage (see Exhibit 2). WEB PCs
may progress much more swiftly because they are simple appliances that
do not have the learning curve and skill requirements of Java. New fea-
tures that are needed to make Java an operational technology are an-
nounced monthly.
The improved performance elements that a Java/WEB PC provides
over a fat client Microsoft/Intel environment are the following:
• simplicity of use
• dynamic software distribution
• simplified software administration and customer support and service
• portability
• openness
• less-expensive client hardware
through source code compilers, just in compilers, and byte code compil-
ers. This is an excellent example of how a technology improves as it
rides the “S” curve.
SUMMARY
In this section, “S” curves have been applied to analyze Java technology
and the associated technology of WEB PCs. What has been seen is that
much of the rhetoric about these technologies, as well as about the Mi-
crosoft/Intel defending technologies, is fully explainable through an “S”
curve analysis. It is this author’s conclusion that Java will prove to be a
successful attacker.
• Train staff in “S” curves. The entire training can be done in a half day.
Supplemented by the readings in the bibliography, “S” curves can be
understood in a day.
• Insist that new technology proposals include an “S” curve analysis.
Have the staff perform the “S” curve analysis across time (i.e., the sit-
uation today, six months from now, and a year from now).
• Insist that suppliers present information in terms of “S” curves. Ask
them what they are attacking, what kind of attack is it, and how gath-
ering the know-how can be accelerated. In addition, how will they
overcome the dominant logic?
• Have some team members take the role of the defenders. Let them
explain how they will defend against the attack. Why will the attack
fail?
• Reverse the roles of the attacker and the defender. Could the defend-
er as the attacker win? Could the attacker as defender uphold its
dominant logic?
• Keep the debate on adopting new technologies centered on “S”
curves. This will eliminate the emotionalism that is common in tech-
nology substitution situations.
CONCLUSION
In the coming years, the rush of new technologies offering promise to
businesses will accelerate. While the risks and rewards associated with
technology decisions both increase, time windows for making these de-
cisions will shorten. People will want to know now. They will want to
know why what is being done is being done. Whether one chooses to
implement the new technology or defer, some interest group will want a
cogent explanation.
In the chaos of business in the late 1990s, “S” curves can provide an
anchor for a fast and substantive analysis of emerging technologies. They
supplement existing methods and provide a strategic perspective that
many popular approaches do not consider. The efficacy of the technolo-
gy selection process will be dramatically improved with the incorpora-
tion of “S” curve analysis.
Bernard “Bernie” Boar has published several books on the topics of IT strategy and architec-
ture, and has been published in both IT and business strategy journals. He speaks frequently
at leading industry conferences on IT strategy, IT management, and IT architecture. Mr. Boar
is Director, Strategic Solutions for RCG Information Technology in Iselin, NJ. He can be
reached at 732-194-0508 or via e-mail: [email protected].