Exploit Disruptive Infrastructure Technology

Disrupt or be disrupted. Start here.


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Failing to develop a systematic disruptive technology exploitation process can lead to:

  • Technology adoption without a strong empirical basis.
  • Unnecessarily risky technology ventures.
  • Falling behind more agile competitors.

A systematic disruptive technology exploitation process can lead to:

  • Evidence-based technology adoption.
  • Low risk, high reward technology ventures.
  • Improving or maintaining the organization’s position as an industry leader.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Module 1: Pre-work: Establish the Disruptive Tech Process

The Purpose

  • Discuss the general overview of the disruptive technology exploitation process.
  • Develop an initial disruptive technology exploitation plan.

Key Benefits Achieved

  • Stakeholders are on board, the project’s goals are outlined, and the working group is selected.

Activities: Outputs:
1.1 Get execs and stakeholders on board.
1.2 Review the process of analyzing disruptive tech.
  • Initialized disruptive tech exploitation plan
1.3 Select members for the working group.
1.4 Choose a schedule and time commitment.
1.5 Select a group of visionaries.
  • Meeting agenda, schedule, and participants

Module 2: Hold the Initial Meeting

The Purpose

  • Understand how disruption will affect the organization, and develop an initial list of technologies to explore.

Key Benefits Achieved

  • Knowledge of how to think like a futurist.
  • Understanding of organizational processes vulnerable to disruption.
  • Outline of potentially disruptive technologies.

Activities: Outputs:
2.1 Start the meeting with introductions.
2.2 Train the group to think like futurists.
2.3 Brainstorm about disruptive processes.
  • List of disruptive organizational processes
2.4 Brainstorm a longlist.
2.5 Research and brainstorm separate longlists.
  • Initial longlist of disruptive tech

Module 3: Create a Longlist and Assess Shortlist

The Purpose

  • Evaluate the specific value of longlisted technologies to the organization.

Key Benefits Achieved

  • Defined list of the disruptive technologies worth escalating to the proof of concept stage.

Activities: Outputs:
3.1 Converge the longlists developed by the team.
  • Finalized longlist of disruptive tech
3.2 Narrow the longlist to a shortlist.
  • Shortlist of disruptive tech
3.3 Assess readiness and value.
  • Value-readiness analysis
3.4 Perform a SWOT analysis.
  • SWOT analysis
  • Candidate(s) for proof of concept charter

Module 4: Create an Action Plan

The Purpose

  • Understand how the technologies in question will impact the organization.

Key Benefits Achieved

  • Understanding of the specific effects of the new technology on the business processes it is intended to disrupt.
  • Business case for the proof-of-concept project.

Activities: Outputs:
4.1 Build a problem canvas.
  • Problem canvas
4.2 Identify affected business units.
4.3 Outline and map the business processes likely to be disrupted.
  • Map of business processes: current state
4.4 Map disrupted business processes.
  • Map of disrupted business processes
4.5 Recognize how the new technology will impact business processes.
  • Business case for each technology
4.6 Make the case.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019