Reading List for Technology and Creativity Strategy:
463 - Supervision and Technique, Kellogg University of Administration
Professor Shane Greenstein
College students will be placed accountable for almost all required blood pressure measurements. These should be read in front of class discussion. Related readings happen to be relevant backdrop. These are included for the interested scholar. I suggest them to get a fuller perspective on the theme.
Topic one particular: Basic Frameworks and Toolkits
Topic 1a. Adoption and Evolution
Geoffrey Moore. Chapters 1 and a couple of, High Tech Promoting Illusion, Advanced marketing Enlightenment, Crossing the Chasm, Harper Business, 2006. (Not in reading supply. Please buy book. )
Rosenberg, Nathan, " Innovation's Uncertain Landscape. вЂќ McKinsey Quarterly, pp. 170-185, Issue 3, 1995.
In class online video:
Interview with Dan Bricklin, founder of Visicalc, from Triumph of the Nerds, An Irreverent Great the COMPUTER Industry, Simply by Bob Cringely. Ambrose Video, RM Associates. 1996
Geoffrey Moore, To achieve the Long Term, Concentrate on the Middle Term, Harvard Organization Review, September 2007.
Wolter Lemstra, Vic Hayes and John Groenewegen, " Bridging the Chasm: the Apple AirPort. вЂќ Chapter 4 of The Creativity Journey of Wi-Fi: The Road to Global Success, Cambridge Press.
Greenstein, " Virulent Word of Mouse. вЂќ And " An Earful about Zvi's Email. вЂќ http://www.kellogg.northwestern.edu/faculty/greenstein/images/columns-older.html
" Early Essayer, Enthusiast or perhaps Pioneer? A User's guide to Technology Lingo. вЂќ http://virulentwordofmouse.wordpress.com/
1b: Acquiring value in value chains: the basics.
Greg Linden, Kenneth T. Kraemer, and Jason Dedrick, " Who Captures Value from advancement in global value stores? A Study of the iPod and Notebook PC. Commercial and Corporate Change, June, 2009.
Greg Linden, Kenneth D. Kraemer, and Jason Dedrick, The Circulation of Value inside the Mobile Phone Source Chain
Francesco Zirpoli and Markus C. Becker, " What Happens At the time you Outsource a lot of? вЂќ SMR 374, Winter months 2011.
Theme 1c: Attackers' advantage during diffusion
" The Catastrophe at Encyclopeadia Britannica, вЂќ Kellogg Instructing Case, Modified version, Aug, 2009.
Joseph Bower and Clayton Christensen, " Bothersome Technologies: Capturing the Wave" in (Ed) John Seely Brown, Seeing Differently: Information on Development, Harvard Business Review Publication, 1997
Observe class web page on Blackboard, under the Task folder.
Steve Hagel 3, John Seeley Brown, Lang Davison, " Shaping Approach in a World of Constant Disruption, вЂќ Harvard Business Assessment, October 2008.
Greenstein, " Creative Destruction and Deconstruction. вЂќ http://virulentwordofmouse.wordpress.com/, October, 2005.
Topic 1d: Installed Basic and Standards
Carl Shapiro and Hal Varian inc., Information Rules, Chapters five, 6, 7 & almost 8. Recognizing Lock-in, Managing Lock-in, Networks and Positive Feedback, Cooperation and Compatibility, Harvard Business Institution Press, 98. (Not in case packet. Please purchase book. )
In class video:
Interview with the pioneers of The security software Associates, via Nerds installment payments on your 0. you, A Brief History with the Internet, Frank Cringely, PBS Home Online video, 1998.
" Bleeding Edge Mass Market Standards, вЂќ and " Bird Observing for Nerds: Splintering the world wide web, вЂќ and " The Grocery Scanner and Tavern Code Economic system, вЂќ http://virulentwordofmouse.wordpress.com/
Topic 1e: Attackers Advantage versus Mounted Base: Ms and Netscape
Browser Battles, 1994-98, HBS Case 9-798-094
In class video:
Interview with Andreeson, Clark simon, Gates, Ballmer, Metcalfe, by Nerds 2 . 0. one particular, A Brief History in the Internet, Frank Cringely, PBS Home Online video, 1998.