PROGRAM MBADS (SEM 4/SEM 6) MBAFLEX / MBAN 2 (SEM4) PGDISMN (SEM 2) SUBJECT CODE & NAME MI0040- TECHNOLOGY MANAGEMENT BK ID B1326 CREDITS 4 MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.
1 Consider that you are a manager in a company and you want to manage a technology that is newly incorporated.
a. Describe the effects of technologies on business.
b. Prepare a list of the factors that are considered in managing technology.
Answer : Effects of technologies on business :
Shrinking world: Technology has made national and international commerce a much more feasible reality. Today, people and businesses can buy and sell with people all over the world. In past history it might have taken months for a letter to go from one party to another. Now, an email can reach someone in seconds, and a transaction can be completed with the push of a button. While this is terribly convenient for some businesses, it does make some people impatient when they actually have to wait for things. Reduced costs of operations: Different companies use different technologies for reducing manufacturing and administrative costs. New product and new market creation: This involves the introduction of technology for the miniaturization of the product. This involves the technology to reduce the size, become easily portable and useful for many applications. For example, the Sony Corporation has introduced the miniaturization technology that aimed at developing the product with high portability. Adaptation to changes in scale and format: This focuses on how the devices support the different features. For example, the mobile can support the email, browsing and so on. Improved customer service: This involves the introduction of technology for improving customer service. This helps to gain the market in the present competitive world. Reorganised administrative operations: This involves the effect of technology on the administrative activities. For example, the introduction of Automated Teller Machines (ATMs) in the bank has reduced the employee effort that is required of distributing the cash at the cash counter.
Key issues in managing technological innovation
Technology and long-term cycles: There are some economists who argue that technology affects growth and recession in the world economy. The infrastructure is useful for maturation of the technologies. When the down turn starts to come up again then organisations has to invest the capital equipment that is based on the new technologies. Technology and comparative advantage: At the national level, the firms will have more value when it has both the comparative advantage and also the technological lead. All the other companies from the world look for your organisation. For example, a Korean shipbuilding industry has become the leader by increasing the size of the shipyards and many techniques that were incorporated to increase the productivity and capacity of the vessels. The skills, knowledge and competitive leadership have helped them to achieve more heights.
The emerging technologies play a major role in the present world. We know that information technology plays an important role in the present competitive market and artificial intelligence is the subset of information technology. Artificial intelligence is that category of computer science which is related to making computers behave like humans. Artificial intelligence can create the human brain and replace many of the tasks.
Information technology includes both the hardware and software. The hardware includes the physical products and components associated with the product. But software includes the know-how technique and the procedure that is involved with that. The hardware again is of two types. One is related to the end-use product type like the automobiles, computers and televisions. The second type in the hardware is the production tool type like instruments, machinery and equipments. The software technology is also of two types. One of the software type is the "know-how" type such as the processes techniques and next is the "know-why" type technology that includes the knowledge, skills and experience.
The technology is viewed in a different way by different people. Some think that technology is a source of wealth, well-being. Some think that technology has destroyed many of the jobs, environment and social values. Technology is improving the poorest of the poor. We can see that many of the countries that are poor though they are very rich in the resources, such as new technologies. The poorness is due to the increasing population; technological base is very small or due to the resources that are getting depleted because of the export to other countries. It is possible for us to achieve the basic human needs in this technological world.
2 The purpose of forecast is to improve the quality of the decisions related to selection of an alternative from available alternatives and not to force to accept a particular decision.
Answer :
The Forecasting Process
Primary forecasting techniques help organizations plan for the future. Some are based on subjective criteria and often amount to little more than wild guesses or wishful thinking. Others are based on measurable, historical quantitative data and are given more credence by outside parties, such as analysts and potential investors. While no forecasting tool can predict the future with complete certainty, they remain essential in estimating an organization's forward prospects.
We can classify the technology forecasting methods into two methods, which are, exploratory, and normative forecasting methods. These methods include some techniques too.
Exploratory Methods: Exploratory methods are primarily concerned with the analysis of historical data. Selected attributes such as functional performance, technical parameters, economic performance, and so on are plotted against time. Since, it is usually assumed that progress is evolutionary and that technological progress is not random, it is possible to generate characteristic curves or patterns from the data and from these patterns forecasts can be made with varying degrees of certainty. The exploratory methods include methods like the intuitive forecasting, extrapolation, growth curves and technology monitoring. Let us study these methods and techniques in brief.
Intuitive forecasting: This is the most widely used forecasting method. This method assumes that the experience and education of experts is sufficient to forecast the vectors of expansion and evaluation in a specific field. The intuitive method mainly involves two techniques that are the Delphi technique and the opinion polls technique. o Delphi technique: The Delphi technique involves the comparisons of expert projections of future technical developments. This helps us in projecting the future technical and market developments. This also involves the uncovering of the fundamental differences in opinion. This technique also identifies the unconventional ideas. o Opinion polls: The opinion poll technique involves the opinion of different experts. This technique involves the joint assessment of different ideas. This technique also helps us in knowing the new technologies and evaluating many of the options of the new technologies.
Extrapolation technique: The extrapolation is the most usual method of forecasting in exploratory methods. The extrapolation method involves the extension of the present methods for the future. We can classify the techniques in extrapolation as the linear extrapolation and the exponential extrapolation.
Linear extrapolation: The linear extrapolation involves the creation of tangent line at the end of known data and then extending the line beyond that limit. Linear extrapolation gives the good results when this is extended approximately as the linear function and not too far behind the known data. o Exponential extrapolation: The exponential extrapolation is the non-linear extrapolation. This includes the historical trends of a particular period of time and these trends are extended for the future. This is reliable, simple and inexpensive. Growth curves: This is another method included in exploratory methods. The growth curves are reformulated from a time basis to an observation basis. This includes the numerous time series of growth behaviour that are collected and categorised according to data characteristics. The growth curve includes the pearl curve and gompertz curve techniques. o Pearl curve: The pearl curve is an inhibitive model of technology growth. Pearl curves are produced, when there is some competitive situation between the two technologies with same growth rates. o Gompertz curve: The gompertz curve uses the pearl curve to show the pattern in which the maturing technologies approach the development limits. This is the preferred model for the technology adoptions that are driven by the technical superiority of the new technology. Technology monitoring: Technology monitoring is also an exploratory method. We can define this method as a method that looks after the monitoring of the technologies. This is based on analysis and meaning of signals of change. Growth curve assumes the good continuity between the past and future and they are incapable of predicting the breakthroughs.
Normative Methods: We have discussed about the exploratory methods and techniques. We will now discuss the normative methods of forecasting. The normative forecasting provides the budgetary decision in the technological area. The normative approach includes the well organised attempts to allocate the money, manpower and the other resources, on a rational basis, that might affect the technology forecast of the future. The normative methods include the three methods, namely, relevance trees, morphological analysis and mission flow diagrams. Relevance tree: The relevance tree includes the hierarchical listing of the tasks and the alternatives. In this tree, we consider each branch as a goal. The relevance tree is helpful for all the planners to systematically assess all the interlinked technologies. Morphological analysis: Morphological analysis involves systematic evaluation of all possible combination of solutions to the individual parts of a system. This involves the breaking down of main task into smaller tasks and treating all the individual tasks separately and finding the solutions for that. Mission flow diagrams: The mission flow diagram indicates the mapping of all the substitute routes or sequences for finishing a given task. We need to determine the important steps on each route and also identify the problems and costs related with each route. Then, we can derive the performance requirements for every relevant technology and we can use the same as normative forecasts.
3 Write short notes on
a. Technology adoption Answer : The technology life-cycle (TLC) describes the commercial gain of a product through the expense of research and development phase, and the financial return during its "vital life". Some technologies, such as steel, paper or cement manufacturing, have a long lifespan (with minor variations in technology incorporated with time) whilst in other cases, such as electronic or pharmaceutical products, the lifespan may be quite short.
Steps in Technology Adoption Plan
Identify the target group: For any project, the target group signifies the customers. This process involves the identification of the customers. The plan can be implemented very well if we know the view of the customers. Locate and analyse the resistance to change: The introduction of the new technology in the organisation cause the change process in the organisation. It is the human tendency to resist the change, when they are very comfortable with the old values and beliefs. They locate and analyse the resistance to change, which involves the identification and analysis of the resistances to change. Assess actual ability to change: We have to check whether we as the organisation, are capable to introduce the technology and undergo change process. Assess capacity and resources to change: We even have to see whether we have sufficient resources to undergo the change process.
Access perceived priority of change: We have to prioritise the activities of change process. Specific planning should include: Identify the division(s), section(s), and individuals involved in the change. Specify the extent of changes. Develop a change plan which embraces timing, communication methods, involvement of individuals, and responsibilities of individuals.
b. Technology diffusion Answer : Technology and technological innovation play a central role in the organization and delivery of health services and are a driver of optimal health outcomes.
Diffusion of innovations is a theory that seeks to explain how, why, and at what rate new ideas and technology spread through cultures. Everett Rogers, a professor of communication studies, popularized the theory in his book Diffusion of Innovations; the book was first published in 1962, and is now in its fifth edition (2003).
The process of adopting the new technology by the customers who came to know about the technology from other customers is called as the technology diffusion. Diffusion involves special types of communication methods or system to help diffuse changes in practice, as well as changes in knowledge or attitudes. Thus, we can say that diffusion is the process of closing the gap between what people do not know and what they can effectively put to use.
Technology diffusion plays a major role in most of the countries today. The barriers to technology diffusion help us to determine the magnitude of technology diffusion. These barriers determine the volumes of diffusion.
The technology diffusion plays more important role in the sector of goods that are not tradable, than the sector with the tradable goods. The free technology diffusion generates more gains compared to that of the free merchandise trade. We can increase the merchandise trade by removing the diffusion barriers since the countries achieve higher productivity by taking the technology from the diffusion process.
A well-managed technology diffusion system enables an organisation to plan its technology development projects in a more meaningful manner as well as transfer the technologies more successfully.
c. Technology absorption Answer : The term absorption is nothing but the process of absorbing something. It involves Know- why exercises, basic investigations into the product and or process and or systems. This will require unpack aging of a technology package. It requires R&D projects in know-why, optimization and improvement of product/process/systems and related equipments.We have to acquire technology from sources within or outside the country, and one of the ways to acquire technology is, by the process of technology absorption. Once a technology is imported from another country, it needs to be absorbed and updated in accordance with the local requirements. Foreign technology may have been developed keeping in view different parameters relating to scale of production, raw materials and components, quality standards, costs, levels and types of production techniques, maintenance requirements, social aspects including environmental and pollution aspects, employment, so on It is common in many developing countries to import technology as a package.
Benefits of technology absorption :
After the role of technology absorption, we will now study about the benefits that we get from technology absorption exercises, as evidenced by Government and industry experiences so far. These benefits are: Repeated collaborations for the same product/ process are avoided. Acquisition of further technologies becomes selective. Ability is developed to unpackage the technology. Savings can be affected in foreign exchange due to indigenisation /use of indigenous alternatives. Effective utilisation is made of available indigenous research expertise and facilities to achieve the desired results. Know-why and technology upgradation capabilities are built-up. Exports are increased. Technically competent groups of scientists and engineers trained in technology absorption get matured and strengthened. The base for technological self-reliance is enhanced.
4 When you choose a new technology, you may have to face some of the question like what are its functional requirements, non-functional requirements and does the technology fit the organization culture?
Answer : In a very short span, exercise of latest technologies such as instant messaging, Voice over Internet Protocol (VoIP) phone service, WiFi Internet access, video conferencing and smart cell phones, have come up. As a result of these new technologies, small businesses are getting a lot of opportunities to advance their processes and connect with customers. But, if youre likely to adopt too many technologies, then you will be spending most the time in integrating new technology without having enough hours for getting the real work done.
Let us have a look at some questions that are likely to arise, when you choose a new technology. Will the chosen technology enhance the efficiency and productivity of small business? What are its functional requirements? What are its non-functional requirements? What are the selection criteria? Does the technology fit the organisation culture?
We can get the answers to these questions by following some tips related to the selection of a new technology. These tips are:
Before choosing a new technology, the operational efficiency, control costs and productivity of the technology should be determined. It is not reliable to adopt a new technology, if your competitor owns it. The choice of your latest technology must incorporate flawlessly into production and hold up your existing purposes. An important consideration is that it should assure your potential needs with minimum upgrades. The availability of your service and support should be determined beforehand. The services like the major and minor upgrades must be provided by the vendor. The use of solution packages or customer proprietary packages that no longer support you should be avoided. The selection of new technology based on the lowest price should be avoided which would otherwise result in less capability, thereby costing your time and money. For instance, buying a costly computer for every three to five years instead of a low price one for every year would save your time and problems. It doesnt necessarily mean that that you have to purchase the top products. Do not always go for buying a name brand product. For example, the computers have turn out to be a commodity, which means reaching a known brand do not automatically indicate you are accomplishing an enhanced quality. It implies, you are getting enhanced technological support. An important point to be kept in mind is that although computers are easy to repair and maintain, you can engage somebody locally to repair at a reasonable price. A good selection of the retailer is important than going for a brand in order to provide you with technical support in case of problems. The retailer is the one who would be keeping you happy by satisfying your needs. Therefore, make sure the return policy provided by the retailer is good and replenish fees are not charged. The services that provide you with long distance charges should be avoided. The services like VOIIP should be used, since it is less expensive. Also, it provides many facilities that are not currently available in standard land lines. It has the provision to forward the office calls to your home or cell, or have mail delivered to your email. The web provides a lot of applications, services, and tools which have become the valuable things in life, available free of cost. It doesnt mean only email or instant messaging accounts are provided free of charge. There are some application alternatives providing better results than small businesses be able to do with conventional applications.
Memristor: A Groundbreaking New Circuit: This technology has a unique feature, that is, it can retain information for the amount of current that has passed through it. By varying the amount of current, it has the tendency to become a one-element circuit component with unique features. It has the tendency to replace the flash drives that are being used today, because it can retain its electronic state even though the current is turned off. If we compare the cost constraint with the flash memories, Memristor is relatively cheaper and offers greater memory densities. Also, it can restore the RAM chips, so that, after turning off your computer, again when you will turn it on it will provide details concerning what it was doing previously.
5 Write short notes on
a. Bridging agencies Answer : In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs).
There are some agencies because of whom the transfers of technology take place, comprises of government departments, industries, financial institutions, consultants, venture capital companies, research companies, and R&D organisations, and so on.
b. Problem solver model Answer : In order to correctly solve a problem, it is important to follow a series of steps. Many researchers refer to this as the problem-solving cycle, which includes developing strategies and organizing knowledge. While this cycle is portrayed sequentially, people rarely follow a rigid series of steps to find a solution. Instead, we often skip steps or even go back through steps multiple times until the desired solution is reached.
As per this model, the generation and transfer of technology, acts as a companion of problem solving.
c. Bar-Zakay model Answer : The Bar-Zakay model: This model is based on a project management approach, and was introduced by Bar-Zakay {managing partner of films, who focused his practice on personal injury and wrongful death law). As per this model, we can divide the process of technology transfer into four stages: Search. Adapt. Implement. Maintain.
This model specifies the activities to be carried out and also accentuates the importance of both transferor and transferee to expertise for undertaking technological forecasting, long-range planning, and gathering of project-related intellect. In this model, the term donor is used, which refers to the transferor and gives an impression that the owner of technology is giving away a valuable asset out of selfless reasons. A disadvantage of the Bar-Zakay model is that the activities, terms, and facts expressed in this model had reversed the position of the consumers (mainly passive) of technology who trusted on the programs supported the purchase of technology to a greater extent during the period 1960 to 1970. And during that period the government controls were used to identify the speed, direction, and value of technology flows.
The Bar-Zakay model helps us to learn some facts, which are: The need of comprehensive examination of the technology transfer process from search stage all through post-implementation stage. Adoption of a process approach to plan and implement the technology transfer projects. The need of objectives and decision points to strengthen the activities, to correct the mistakes, or even to terminate the projects at any point of time.
d. Schlie, Radnor and Wad model Answer : Schlie introduced a simple, universal model for technology transfer process. This model describes seven elements which manipulates the planning, implementation, and ultimate success to any technology transfer project. These seven elements include: 1. The transferor, who sells the technology to the recipient. 2. The transferee, who buys the technology. 3. The technology that has to transfer. 4. The transfer mechanism chosen for the transfer the preferred technology. 5. The environment in which the transferor is working. The transferor environment characteristics can manipulate the effectiveness of the transfer process. It includes: Among others. Financial status. Business point of reference (inward versus outward). Constancy (Stability). Attitude and obligation to the transfer project. Operating policies.
6. The environment in which the transferee is working. The transferee environment characteristics can manipulate the absorptive capacity of the transferee. It includes:
Physical and organisational infrastructure. Availability of skills. Attitude and obligation to the transfer project. Technological status. Financial status. Business point of reference (inward versus outward). Stability.
The larger environment that surrounds both the transferor and the transferee. This environment has three layers; they are sub-regional, regional, and global. If the layers of the larger environment will not uphold, then it will affect the cross-border and international technology transfer even if the immediate operating environments of the transferor and the transferee are favourable to the technology transfer. Factors that influence the success of technology transfer project in the larger environment are: Political relationships between countries. Exchange rates. Investment background. Trade negotiations. Balance of trade. Relative technological levels. Status of intellectual property protection government.
The seven elements of this model are suitable even in todays business environment. The way they establish themselves can change with respect to time. The only disadvantage of this model is that it does not offer any guidelines to a transferee that what it should do.
This model helps us to learn some facts, which are: When planning and implementing a technology transfer project, various changes that had taken place and are taking place in the worldwide business environment today is helpful for the managers of technology to develop good insights into the transferee, transferor, and larger environments. We have to choose the technology transfer mechanism based on a sophisticated understanding of the other six elements.
6 Explain the basic scheme for knowledge based applications Answer : Knowledge-based authentication or applications (KBA) is an authentication scheme in which the user is asked to answer at least one "secret" question. KBA is often used as a component in multifactor authentication (MFA) and for self-service password retrieval.
Secret questions can be static or dynamic. In a static scheme, the end user pre-selects the questions he would like to be asked and provides the correct answers. The question/answer pairs are stored by the host and used later to verify the end user's identity. In a dynamic scheme, the end user has no idea what question will be asked.
Management requires a precise understanding of the process which KBT applications demand.
For some instances it is likely for the domain specialist to provide the knowledge to a 'knowledge-base', but more usually a 'knowledge engineer' traps it using some suitable language and supporting software. Afterwards, a user, without consenting to either the domain specialist or the knowledge engineer, confers the knowledge-base. The user provides data about some event or circumstances within the problem domain. The software takes assumptions, by applying the rules present in the knowledge-base to the case-specific data and the typical, domain-specific data. A result is provided to the user, in the form of a diagnosis, prediction, recommendation, and decision depending on the nature of the application.
The scheme given in figure, also integrates three emergent areas of KBT, which are: 1. Knowledge acquisition initiated automatically, by analysing a set of extraordinary cases, either to support the knowledge engineer, or to create the knowledge-base directly. 2. A general knowledge-base, such as, an encyclopaedia represented in a suitable form, or generalised pattern-processing or associational knowledge. It encloses common knowledge or common-sense, and may be used as a foundation upon which the domain-specific knowledge may be built. 3. Natural machine-learning ability, in such a manner that the results of new cases are used by the software to change the existing knowledge-base.