Sie sind auf Seite 1von 14

ASSIGNMENT

DRIVE SPRING 2014


PROGRAM MBADS (SEM 4/SEM 6) MBAFLEX / MBAN 2
(SEM4) PGDISMN (SEM 2)
SUBJECT CODE &
NAME
MI0040- TECHNOLOGY MANAGEMENT
BK ID B1326
CREDITS 4
MARKS 60


Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.

1 Consider that you are a manager in a company and you want to manage a technology that is
newly incorporated.

a. Describe the effects of technologies on business.

b. Prepare a list of the factors that are considered in managing technology.

Answer : Effects of technologies on business :

Shrinking world: Technology has made national and international commerce a much more
feasible reality. Today, people and businesses can buy and sell with people all over the world. In
past history it might have taken months for a letter to go from one party to another. Now, an
email can reach someone in seconds, and a transaction can be completed with the push of a
button. While this is terribly convenient for some businesses, it does make some people impatient
when they actually have to wait for things.
Reduced costs of operations: Different companies use different technologies for reducing
manufacturing and administrative costs.
New product and new market creation: This involves the introduction of technology for the
miniaturization of the product. This involves the technology to reduce the size, become easily
portable and useful for many applications. For example, the Sony Corporation has introduced the
miniaturization technology that aimed at developing the product with high portability.
Adaptation to changes in scale and format: This focuses on how the devices support the
different features. For example, the mobile can support the email, browsing and so on.
Improved customer service: This involves the introduction of technology for improving
customer service. This helps to gain the market in the present competitive world.
Reorganised administrative operations: This involves the effect of technology on the
administrative activities. For example, the introduction of Automated Teller Machines (ATMs) in
the bank has reduced the employee effort that is required of distributing the cash at the cash
counter.

Key issues in managing technological innovation

Technology and long-term cycles: There are some economists who argue that technology
affects growth and recession in the world economy. The infrastructure is useful for maturation of
the technologies. When the down turn starts to come up again then organisations has to invest the
capital equipment that is based on the new technologies.
Technology and comparative advantage: At the national level, the firms will have more value
when it has both the comparative advantage and also the technological lead. All the other
companies from the world look for your organisation. For example, a Korean shipbuilding
industry has become the leader by increasing the size of the shipyards and many techniques that
were incorporated to increase the productivity and capacity of the vessels. The skills, knowledge
and competitive leadership have helped them to achieve more heights.



The emerging technologies play a major role in the present world. We know that information technology
plays an important role in the present competitive market and artificial intelligence is the subset of
information technology. Artificial intelligence is that category of computer science which is related to
making computers behave like humans. Artificial intelligence can create the human brain and replace
many of the tasks.

Information technology includes both the hardware and software. The hardware includes the physical
products and components associated with the product. But software includes the know-how technique and
the procedure that is involved with that. The hardware again is of two types. One is related to the end-use
product type like the automobiles, computers and televisions. The second type in the hardware is the
production tool type like instruments, machinery and equipments. The software technology is also of two
types. One of the software type is the "know-how" type such as the processes techniques and next is the
"know-why" type technology that includes the knowledge, skills and experience.

The technology is viewed in a different way by different people. Some think that technology is a source
of wealth, well-being. Some think that technology has destroyed many of the jobs, environment and
social values. Technology is improving the poorest of the poor. We can see that many of the countries that
are poor though they are very rich in the resources, such as new technologies. The poorness is due to the
increasing population; technological base is very small or due to the resources that are getting depleted
because of the export to other countries. It is possible for us to achieve the basic human needs in this
technological world.

2 The purpose of forecast is to improve the quality of the decisions related to selection of an
alternative from available alternatives and not to force to accept a particular decision.

Answer :


The Forecasting Process






Primary forecasting techniques help organizations plan for the future. Some are based on subjective
criteria and often amount to little more than wild guesses or wishful thinking. Others are based on
measurable, historical quantitative data and are given more credence by outside parties, such as analysts
and potential investors. While no forecasting tool can predict the future with complete certainty, they
remain essential in estimating an organization's forward prospects.

We can classify the technology forecasting methods into two methods, which are, exploratory, and
normative forecasting methods. These methods include some techniques too.

Exploratory Methods: Exploratory methods are primarily concerned with the analysis of historical data.
Selected attributes such as functional performance, technical parameters, economic performance, and so
on are plotted against time. Since, it is usually assumed that progress is evolutionary and that
technological progress is not random, it is possible to generate characteristic curves or patterns from the
data and from these patterns forecasts can be made with varying degrees of certainty. The exploratory
methods include methods like the intuitive forecasting, extrapolation, growth curves and technology
monitoring. Let us study these methods and techniques in brief.

Intuitive forecasting: This is the most widely used forecasting method. This method assumes that the
experience and education of experts is sufficient to forecast the vectors of expansion and evaluation in a
specific field. The intuitive method mainly involves two techniques that are the Delphi technique and the
opinion polls technique.
o Delphi technique: The Delphi technique involves the comparisons of expert projections of future
technical developments. This helps us in projecting the future technical and market developments. This
also involves the uncovering of the fundamental differences in opinion. This technique also identifies the
unconventional ideas.
o Opinion polls: The opinion poll technique involves the opinion of different experts. This technique
involves the joint assessment of different ideas. This technique also helps us in knowing the new
technologies and evaluating many of the options of the new technologies.

Extrapolation technique: The extrapolation is the most usual method of forecasting in exploratory
methods. The extrapolation method involves the extension of the present methods for the future. We can
classify the techniques in extrapolation as the linear extrapolation and the exponential extrapolation.

Linear extrapolation: The linear extrapolation involves the creation of tangent line at the end of known
data and then extending the line beyond that limit. Linear extrapolation gives
the good results when this is extended approximately as the linear function and not too far behind the
known data.
o Exponential extrapolation: The exponential extrapolation is the non-linear extrapolation. This
includes the historical trends of a particular period of time and these trends are extended for the future.
This is reliable, simple and inexpensive.
Growth curves: This is another method included in exploratory methods. The growth curves are
reformulated from a time basis to an observation basis. This includes the numerous time series of growth
behaviour that are collected and categorised according to data characteristics. The growth curve includes
the pearl curve and gompertz curve techniques.
o Pearl curve: The pearl curve is an inhibitive model of technology growth. Pearl curves are produced,
when there is some competitive situation between the two technologies with same growth rates.
o Gompertz curve: The gompertz curve uses the pearl curve to show the pattern in which the maturing
technologies approach the development limits. This is the preferred model for the technology adoptions
that are driven by the technical superiority of the new technology.
Technology monitoring: Technology monitoring is also an exploratory method. We can define this
method as a method that looks after the monitoring of the technologies. This is based on analysis and
meaning of signals of change. Growth curve assumes the good continuity between the past and future and
they are incapable of predicting the breakthroughs.

Normative Methods: We have discussed about the exploratory methods and techniques. We will now
discuss the normative methods of forecasting. The normative forecasting provides the budgetary decision
in the technological area. The normative approach includes the well organised attempts to allocate the
money, manpower and the other resources, on a rational basis, that might affect the technology forecast of
the future. The normative methods include the three methods,
namely, relevance trees, morphological analysis and mission flow diagrams.
Relevance tree: The relevance tree includes the hierarchical listing of the tasks and the alternatives. In
this tree, we consider each branch as a goal. The relevance tree is helpful for all the planners to
systematically assess all the interlinked technologies.
Morphological analysis: Morphological analysis involves systematic evaluation of all possible
combination of solutions to the individual parts of a system. This involves the breaking down of main
task into smaller tasks and treating all the individual tasks separately and finding the solutions for that.
Mission flow diagrams: The mission flow diagram indicates the mapping of all the substitute routes or
sequences for finishing a given task. We need to determine the important steps on each route and also
identify the problems and costs related with each route. Then, we can derive the performance
requirements for every relevant technology and we can use the same as normative forecasts.




3 Write short notes on

a. Technology adoption
Answer : The technology life-cycle (TLC) describes the commercial gain of a product through the
expense of research and development phase, and the financial return during its "vital life". Some
technologies, such as steel, paper or cement manufacturing, have a long lifespan (with minor variations in
technology incorporated with time) whilst in other cases, such as electronic or pharmaceutical products,
the lifespan may be quite short.


Steps in Technology Adoption Plan


Identify the target group: For any project, the target group signifies the customers. This process
involves the identification of the customers. The plan can be implemented very well if we know the view
of the customers.
Locate and analyse the resistance to change: The introduction of the new technology in the
organisation cause the change process in the organisation. It is the human tendency to resist the change,
when they are very comfortable with the old values and beliefs. They locate and analyse the resistance to
change, which involves the identification and analysis of the resistances to change.
Assess actual ability to change: We have to check whether we as the organisation, are capable to
introduce the technology and undergo change process.
Assess capacity and resources to change: We even have to see whether we have sufficient resources to
undergo the change process.

Access perceived priority of change: We have to prioritise the activities of change process.
Specific planning should include:
Identify the division(s), section(s), and individuals involved in the change.
Specify the extent of changes.
Develop a change plan which embraces timing, communication methods, involvement of individuals, and
responsibilities of individuals.


b. Technology diffusion
Answer : Technology and technological innovation play a central role in the organization and delivery of
health services and are a driver of optimal health outcomes.

Diffusion of innovations is a theory that seeks to explain how, why, and at what rate new ideas and
technology spread through cultures. Everett Rogers, a professor of communication studies, popularized
the theory in his book Diffusion of Innovations; the book was first published in 1962, and is now in its
fifth edition (2003).

The process of adopting the new technology by the customers who came to know about the technology
from other customers is called as the technology diffusion. Diffusion involves special types of
communication methods or system to help diffuse changes in practice, as well as changes in knowledge or
attitudes. Thus, we can say that diffusion is the process of closing the gap between what people do not
know and what they can effectively put to use.

Technology diffusion plays a major role in most of the countries today. The barriers to technology
diffusion help us to determine the magnitude of technology diffusion. These barriers determine the
volumes of diffusion.

The technology diffusion plays more important role in the sector of goods that are not tradable, than the
sector with the tradable goods. The free technology diffusion generates more gains compared to that of
the free merchandise trade. We can increase the merchandise trade by removing the diffusion barriers
since the countries achieve higher productivity by taking the technology from the diffusion process.

A well-managed technology diffusion system enables an organisation to plan its technology development
projects in a more meaningful manner as well as transfer the technologies more successfully.



c. Technology absorption
Answer : The term absorption is nothing but the process of absorbing something. It involves Know-
why exercises, basic investigations into the product and or process and or systems. This will require
unpack aging of a technology package. It requires R&D projects in know-why, optimization and
improvement of product/process/systems and related equipments.We have to acquire technology from
sources within or outside the country, and one of the ways to acquire technology is, by the process of
technology absorption. Once a technology is imported from another country, it needs to be absorbed and
updated in accordance with the local requirements. Foreign technology may have been developed keeping
in view different parameters relating to scale of production, raw materials and components, quality
standards, costs, levels and types of production techniques, maintenance requirements, social aspects
including environmental and pollution aspects, employment, so on It is common in many developing
countries to import technology as a package.


Benefits of technology absorption :

After the role of technology absorption, we will now study about the benefits that we get from technology
absorption exercises, as evidenced by Government and industry experiences so far. These benefits are:
Repeated collaborations for the same product/ process are avoided.
Acquisition of further technologies becomes selective.
Ability is developed to unpackage the technology.
Savings can be affected in foreign exchange due to indigenisation /use of indigenous alternatives.
Effective utilisation is made of available indigenous research expertise and facilities to achieve
the desired results.
Know-why and technology upgradation capabilities are built-up.
Exports are increased.
Technically competent groups of scientists and engineers trained in technology absorption get
matured and strengthened.
The base for technological self-reliance is enhanced.

4 When you choose a new technology, you may have to face some of the question like what are its
functional requirements, non-functional requirements and does the technology fit the organization
culture?

Answer : In a very short span, exercise of latest technologies such as instant messaging, Voice over
Internet Protocol (VoIP) phone service, WiFi Internet access, video conferencing and smart cell phones,
have come up. As a result of these new technologies, small businesses are getting a lot of opportunities to
advance their processes and connect with customers. But, if youre likely to adopt too many technologies,
then you will be spending most the time in integrating new technology without having enough hours for
getting the real work done.

Let us have a look at some questions that are likely to arise, when you choose a new technology.
Will the chosen technology enhance the efficiency and productivity of small business?
What are its functional requirements?
What are its non-functional requirements?
What are the selection criteria?
Does the technology fit the organisation culture?

We can get the answers to these questions by following some tips related to the selection of a new
technology. These tips are:

Before choosing a new technology, the operational efficiency, control costs and productivity of
the technology should be determined. It is not reliable to adopt a new technology, if your
competitor owns it.
The choice of your latest technology must incorporate flawlessly into production and hold up
your existing purposes. An important consideration is that it should assure your potential needs
with minimum upgrades.
The availability of your service and support should be determined beforehand. The services like
the major and minor upgrades must be provided by the vendor. The use of solution packages or
customer proprietary packages that no longer support you should be avoided.
The selection of new technology based on the lowest price should be avoided which would
otherwise result in less capability, thereby costing your time and money. For instance, buying a
costly computer for every three to five years instead of a low price one for every year would save
your time and problems. It doesnt necessarily mean that that you have to purchase the top
products.
Do not always go for buying a name brand product. For example, the computers have turn out to
be a commodity, which means reaching a known brand do not automatically indicate you are
accomplishing an enhanced quality. It implies, you are getting enhanced technological support.
An important point to be kept in mind is that although computers are easy to repair and maintain,
you can engage somebody locally to repair at a reasonable price.
A good selection of the retailer is important than going for a brand in order to provide you with
technical support in case of problems. The retailer is the one who would be keeping you happy by
satisfying your needs. Therefore, make sure the return policy provided by the retailer is good and
replenish fees are not charged.
The services that provide you with long distance charges should be avoided. The services like
VOIIP should be used, since it is less expensive. Also, it provides many facilities that are not
currently available in standard land lines. It has the provision to forward the office calls to your
home or cell, or have mail delivered to your email.
The web provides a lot of applications, services, and tools which have become the valuable things
in life, available free of cost. It doesnt mean only email or instant messaging accounts are
provided free of charge. There are some application alternatives providing better results than
small businesses be able to do with conventional applications.


Memristor: A Groundbreaking New Circuit: This technology has a unique feature, that is, it can retain
information for the amount of current that has passed through it. By varying the amount of current, it has
the tendency to become a one-element circuit component with unique features. It has the tendency to
replace the flash drives that are being used today, because it can retain its electronic state even though the
current is turned off. If we compare the cost constraint with the flash memories, Memristor is relatively
cheaper and offers greater memory densities. Also, it can restore the RAM chips, so that, after turning off
your computer, again when you will turn it on it will provide details concerning what it was doing
previously.


5 Write short notes on

a. Bridging agencies
Answer : In telecommunication networks, a bridge is a product that connects a local area network (LAN)
to another local area network that uses the same protocol (for example, Ethernet or token ring). You can
envision a bridge as being a device that decides whether a message from you to someone else is going to
the local area network in your building or to someone on the local area network in the building across the
street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN,
and forwarding those known to be on the other interconnected LAN (or LANs).

There are some agencies because of whom the transfers of technology take place, comprises of
government departments, industries, financial institutions, consultants, venture capital companies,
research companies, and R&D organisations, and so on.






b. Problem solver model
Answer : In order to correctly solve a problem, it is important to follow a series of steps. Many
researchers refer to this as the problem-solving cycle, which includes developing strategies and
organizing knowledge. While this cycle is portrayed sequentially, people rarely follow a rigid series of
steps to find a solution. Instead, we often skip steps or even go back through steps multiple times until the
desired solution is reached.

As per this model, the generation and transfer of technology, acts as a companion of problem solving.




c. Bar-Zakay model
Answer : The Bar-Zakay model: This model is based on a project management approach, and was
introduced by Bar-Zakay {managing partner of films, who focused his practice on personal injury and
wrongful death law). As per this model, we can divide the process of technology transfer into four stages:
Search.
Adapt.
Implement.
Maintain.


This model specifies the activities to be carried out and also accentuates the importance of both transferor
and transferee to expertise for undertaking technological forecasting, long-range planning, and gathering
of project-related intellect. In this model, the term donor is used, which refers to the transferor and
gives an impression that the owner of technology is giving away a valuable asset out of selfless reasons.
A disadvantage of the Bar-Zakay model is that the activities, terms, and facts expressed in this model had
reversed the position of the consumers (mainly passive) of technology who trusted on the programs
supported the purchase of technology to a greater extent during the period 1960 to 1970. And during that
period the government controls were used to identify the speed, direction, and value of technology flows.

The Bar-Zakay model helps us to learn some facts, which are:
The need of comprehensive examination of the technology transfer process from search stage all
through post-implementation stage.
Adoption of a process approach to plan and implement the technology transfer projects.
The need of objectives and decision points to strengthen the activities, to correct the mistakes, or
even to terminate the projects at any point of time.

d. Schlie, Radnor and Wad model
Answer :
Schlie introduced a simple, universal model for technology transfer process. This model describes seven
elements which manipulates the planning, implementation, and ultimate success to any technology
transfer project. These seven elements include:
1. The transferor, who sells the technology to the recipient.
2. The transferee, who buys the technology.
3. The technology that has to transfer.
4. The transfer mechanism chosen for the transfer the preferred technology.
5. The environment in which the transferor is working. The transferor environment characteristics
can manipulate the effectiveness of the transfer process. It includes:
Among others.
Financial status.
Business point of reference (inward versus outward).
Constancy (Stability).
Attitude and obligation to the transfer project.
Operating policies.


6. The environment in which the transferee is working. The transferee environment characteristics
can manipulate the absorptive capacity of the transferee. It includes:

Physical and organisational infrastructure.
Availability of skills.
Attitude and obligation to the transfer project.
Technological status.
Financial status.
Business point of reference (inward versus outward).
Stability.


The larger environment that surrounds both the transferor and the transferee. This environment has three
layers; they are sub-regional, regional, and global. If the layers of the larger environment will not uphold,
then it will affect the cross-border and international technology transfer even if the immediate operating
environments of the transferor and the transferee are favourable to the technology transfer. Factors that
influence the success of technology transfer project in the larger environment are:
Political relationships between countries.
Exchange rates.
Investment background.
Trade negotiations.
Balance of trade.
Relative technological levels.
Status of intellectual property protection government.

The seven elements of this model are suitable even in todays business environment. The way they
establish themselves can change with respect to time. The only disadvantage of this model is that it does
not offer any guidelines to a transferee that what it should do.

This model helps us to learn some facts, which are:
When planning and implementing a technology transfer project, various changes that had taken place
and are taking place in the worldwide business environment today is helpful for the managers of
technology to develop good insights into the transferee, transferor, and larger environments.
We have to choose the technology transfer mechanism based on a sophisticated understanding of the
other six elements.


6 Explain the basic scheme for knowledge based applications
Answer : Knowledge-based authentication or applications (KBA) is an authentication scheme in
which the user is asked to answer at least one "secret" question. KBA is often used as a component in
multifactor authentication (MFA) and for self-service password retrieval.

Secret questions can be static or dynamic. In a static scheme, the end user pre-selects the questions he
would like to be asked and provides the correct answers. The question/answer pairs are stored by the host
and used later to verify the end user's identity. In a dynamic scheme, the end user has no idea what
question will be asked.

Management requires a precise understanding of the process which KBT applications demand.



For some instances it is likely for the domain specialist to provide the knowledge to a
'knowledge-base', but more usually a 'knowledge engineer' traps it using some suitable
language and supporting software. Afterwards, a user, without consenting to either the domain
specialist or the knowledge engineer, confers the knowledge-base. The user provides data
about some event or circumstances within the problem domain. The software takes
assumptions, by applying the rules present in the knowledge-base to the case-specific data and
the typical, domain-specific data. A result is provided to the user, in the form of a diagnosis,
prediction, recommendation, and decision depending on the nature of the application.

The scheme given in figure, also integrates three emergent areas of KBT, which are:
1. Knowledge acquisition initiated automatically, by analysing a set of extraordinary cases,
either to support the knowledge engineer, or to create the knowledge-base directly.
2. A general knowledge-base, such as, an encyclopaedia represented in a suitable form, or
generalised pattern-processing or associational knowledge. It encloses common
knowledge or common-sense, and may be used as a foundation upon which the
domain-specific knowledge may be built.
3. Natural machine-learning ability, in such a manner that the results of new cases are
used by the software to change the existing knowledge-base.

Das könnte Ihnen auch gefallen