Exploit Disruptive Infrastructure Technology
Disrupt or be disrupted. Start here.
Book This WorkshopFailing to develop a systematic disruptive technology exploitation process can lead to:
- Technology adoption without a strong empirical basis.
- Unnecessarily risky technology ventures.
- Falling behind more agile competitors.
A systematic disruptive technology exploitation process can lead to:
- Evidence-based technology adoption.
- Low risk, high reward technology ventures.
- Improving or maintaining the organization’s position as an industry leader.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Pre-work: Establish the Disruptive Tech Process
The Purpose
- Discuss the general overview of the disruptive technology exploitation process.
- Develop an initial disruptive technology exploitation plan.
Key Benefits Achieved
- Stakeholders are on board, the project’s goals are outlined, and the working group is selected.
Activities: | Outputs: | |
---|---|---|
1.1 | Get execs and stakeholders on board. |
|
1.2 | Review the process of analyzing disruptive tech. |
|
1.3 | Select members for the working group. |
|
1.4 | Choose a schedule and time commitment. |
|
1.5 | Select a group of visionaries. |
|
Module 2: Hold the Initial Meeting
The Purpose
- Understand how disruption will affect the organization, and develop an initial list of technologies to explore.
Key Benefits Achieved
- Knowledge of how to think like a futurist.
- Understanding of organizational processes vulnerable to disruption.
- Outline of potentially disruptive technologies.
Activities: | Outputs: | |
---|---|---|
2.1 | Start the meeting with introductions. |
|
2.2 | Train the group to think like futurists. |
|
2.3 | Brainstorm about disruptive processes. |
|
2.4 | Brainstorm a longlist. |
|
2.5 | Research and brainstorm separate longlists. |
|
Module 3: Create a Longlist and Assess Shortlist
The Purpose
- Evaluate the specific value of longlisted technologies to the organization.
Key Benefits Achieved
- Defined list of the disruptive technologies worth escalating to the proof of concept stage.
Activities: | Outputs: | |
---|---|---|
3.1 | Converge the longlists developed by the team. |
|
3.2 | Narrow the longlist to a shortlist. |
|
3.3 | Assess readiness and value. |
|
3.4 | Perform a SWOT analysis. |
|
Module 4: Create an Action Plan
The Purpose
- Understand how the technologies in question will impact the organization.
Key Benefits Achieved
- Understanding of the specific effects of the new technology on the business processes it is intended to disrupt.
- Business case for the proof-of-concept project.
Activities: | Outputs: | |
---|---|---|
4.1 | Build a problem canvas. |
|
4.2 | Identify affected business units. |
|
4.3 | Outline and map the business processes likely to be disrupted. |
|
4.4 | Map disrupted business processes. |
|
4.5 | Recognize how the new technology will impact business processes. |
|
4.6 | Make the case. |
|