SlideShare ist ein Scribd-Unternehmen logo
1 von 11
DISRUPTIVE INNOVATION
GROUP 8:
HIMANSHU ARORA
NIKHIL SINGHVI
DEEP DAGA
CHITTRESH DHAWAN
SWATI SINGHAL
INTRODUCTION
• A disruptive innovation offers a lower performance than what the
mainstream market has historically demanded

• At the same time it provides some new performance attributes, which
in turn makes it prosper in a different market

• As it improves along the traditional performance parameters it
eventually displaces the former technology
BACKGROUND
• Early 2000’s: emergence of the internet was challenging the telecom
sector, which held an unopposed position in the field of
communication via features like voice calls, text messages etc.

• Telcos (voice carrier companies) had come to charge high tariffs for
their services and the consumers were now willing to shift to a
cheaper option, if any
VOIP AND P2P: TWO DISTINCT
DISRUPTIVE TECHNOLOGIES
• VoIP:
• IP based application used to provide convenient communication between users
• Essentially used for real time transfer of voice communication
• Major VoIP service providers in 2000’s were cable companies like Time Warner
Cables, telcos like AT&T and Verizon etc.

• Major drawback: VoIP calls were vulnerable to security threats
VOIP AND P2P: TWO DISTINCT
DISRUPTIVE TECHNOLOGIES
• P2P:
• Major development in the way of structuring applications that enabled rapid
transfer of data-packets by mutually exchanging information & services between
producer and consumer of that information

• Rather than being divided into clients and servers, in P2P applications a node
may act as both a client and a server

• Several applications based on this technology were launched, for example P2P
file sharing by Napster, P2P communication by NNTP & Instant Messaging(IM)
etc.
PERCEPTION OF THE TWO TECHNOLOGIES
• Following the norms of evolution of disruptive technologies, both VoIP
and P2P were individually under-valued by traditional lead customers
in their respective markets and were generating lower gross
margins, in addition to being perceived as ‘‘low-end’’ by industry
incumbents (Thomond et al., 2004)
SKYPE
• http://www.youtube.com/watch?v=5nRKyQ11494
SKYPE
• Global Internet Telephone Company based in Luxembourg that
provides a quick, easy and cheap way for subscribers to make VoIP
calls bundled with P2P technology

• Founded by Niklas Zenstrom and Janus Friis
• Features like Skype video/audio chat, Skype Out, Skype In, Skype
Voicemail, Skype SMS

• Tariffs considerably cheaper than traditional telcos and other VoIP
platforms and ‘Skype to Skype’ totally free
WHY SKYPE IS SUCCESSFUL
• Voice quality as good as traditional telephones
• Service of VoIP + P2P
• User friendly (easy to install/use)
• Privacy ensured by encrypted VoIP calls
• Simple and effective promotion strategy, use of strong ‘word of mouse’
networks to build up a mass of users
EFFECTS ON THE TELCO INDUSTRY
• Telcoms forced to re-think their business models to reduce their costs
• More and more players introducing VoIP services
• Customer base shifting to Skype, stealing traditional player’s profits &
threatening their existence

• Competitors such as Viber, FaceTime, Tango, Google
Hangouts, Jitsi, VoxOx and Goober rising in the market

• The whole industry has gotten redefined
REFERENCES
• http://www.makeuseof.com/tag/fed-up-with-skype-here-are-6-of-thebest-free-alternatives/

• http://www.onlinemarketing-trends.com/2011/06/skypetimeline.html#.UopIYpJpkZF

• http://are.berkeley.edu/~sberto/SkypeHype.pdf
• http://faculty.poly.edu/~brao/skype.pdf
• http://www.examiner.com/article/word-of-mouth-or-word-of-mouse

Weitere ähnliche Inhalte

Andere mochten auch

Washing machine innovation
Washing machine innovationWashing machine innovation
Washing machine innovation
nasyatulhusna
 
Chapter 2 theories of innovation
Chapter 2 theories of innovationChapter 2 theories of innovation
Chapter 2 theories of innovation
TriciaToni Gamotin
 
Types and patterns of innovation
Types and patterns of innovationTypes and patterns of innovation
Types and patterns of innovation
azmatmengal
 
10 disruptive innovation
10 disruptive innovation10 disruptive innovation
10 disruptive innovation
Wesley Shu
 

Andere mochten auch (11)

Washing machine innovation
Washing machine innovationWashing machine innovation
Washing machine innovation
 
MIS presentation on Skype business model
MIS presentation on Skype business modelMIS presentation on Skype business model
MIS presentation on Skype business model
 
Usability and user experience the case of skype
Usability and user experience   the case of skypeUsability and user experience   the case of skype
Usability and user experience the case of skype
 
Chapter 2 theories of innovation
Chapter 2 theories of innovationChapter 2 theories of innovation
Chapter 2 theories of innovation
 
Brand leveraging
Brand leveragingBrand leveraging
Brand leveraging
 
Pattern of Innovation
Pattern of InnovationPattern of Innovation
Pattern of Innovation
 
Types and patterns of innovation
Types and patterns of innovationTypes and patterns of innovation
Types and patterns of innovation
 
10 disruptive innovation
10 disruptive innovation10 disruptive innovation
10 disruptive innovation
 
Skype For Business Usability Study
Skype For Business Usability StudySkype For Business Usability Study
Skype For Business Usability Study
 
SIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer worldSIP & TLS - Security in a peer to peer world
SIP & TLS - Security in a peer to peer world
 
10 Creative Thinking Puzzles
10 Creative Thinking Puzzles10 Creative Thinking Puzzles
10 Creative Thinking Puzzles
 

Mehr von Himanshu Arora (12)

Augmented reality
Augmented realityAugmented reality
Augmented reality
 
Presentation on 'Competing on Resources', article by David J. Collins & Cynth...
Presentation on 'Competing on Resources', article by David J. Collins & Cynth...Presentation on 'Competing on Resources', article by David J. Collins & Cynth...
Presentation on 'Competing on Resources', article by David J. Collins & Cynth...
 
Supply Chain Management at Kwality Walls
Supply Chain Management at Kwality WallsSupply Chain Management at Kwality Walls
Supply Chain Management at Kwality Walls
 
Laura Ashley & FedEX: Strategic Alliance
Laura Ashley & FedEX: Strategic AllianceLaura Ashley & FedEX: Strategic Alliance
Laura Ashley & FedEX: Strategic Alliance
 
Vinsun infra engineering: Case on ERP
Vinsun infra engineering: Case on ERPVinsun infra engineering: Case on ERP
Vinsun infra engineering: Case on ERP
 
Starbucks: Brand offering and Positioning
Starbucks: Brand offering and Positioning Starbucks: Brand offering and Positioning
Starbucks: Brand offering and Positioning
 
Case: Zenith (hdtv)
Case: Zenith (hdtv)Case: Zenith (hdtv)
Case: Zenith (hdtv)
 
Scanning Natural Environment of HUL
Scanning Natural Environment of HULScanning Natural Environment of HUL
Scanning Natural Environment of HUL
 
The Case of Complaining Customer
The Case of Complaining CustomerThe Case of Complaining Customer
The Case of Complaining Customer
 
A presentation on chit fund scam of Saradha Group
A presentation on chit fund scam of Saradha GroupA presentation on chit fund scam of Saradha Group
A presentation on chit fund scam of Saradha Group
 
Strategy at Gillete
Strategy at GilleteStrategy at Gillete
Strategy at Gillete
 
Tata Tea: Market Survey and Positioning
Tata Tea: Market Survey and PositioningTata Tea: Market Survey and Positioning
Tata Tea: Market Survey and Positioning
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Kürzlich hochgeladen (20)

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 

Skype: Disruptive Innovation

  • 1. DISRUPTIVE INNOVATION GROUP 8: HIMANSHU ARORA NIKHIL SINGHVI DEEP DAGA CHITTRESH DHAWAN SWATI SINGHAL
  • 2. INTRODUCTION • A disruptive innovation offers a lower performance than what the mainstream market has historically demanded • At the same time it provides some new performance attributes, which in turn makes it prosper in a different market • As it improves along the traditional performance parameters it eventually displaces the former technology
  • 3. BACKGROUND • Early 2000’s: emergence of the internet was challenging the telecom sector, which held an unopposed position in the field of communication via features like voice calls, text messages etc. • Telcos (voice carrier companies) had come to charge high tariffs for their services and the consumers were now willing to shift to a cheaper option, if any
  • 4. VOIP AND P2P: TWO DISTINCT DISRUPTIVE TECHNOLOGIES • VoIP: • IP based application used to provide convenient communication between users • Essentially used for real time transfer of voice communication • Major VoIP service providers in 2000’s were cable companies like Time Warner Cables, telcos like AT&T and Verizon etc. • Major drawback: VoIP calls were vulnerable to security threats
  • 5. VOIP AND P2P: TWO DISTINCT DISRUPTIVE TECHNOLOGIES • P2P: • Major development in the way of structuring applications that enabled rapid transfer of data-packets by mutually exchanging information & services between producer and consumer of that information • Rather than being divided into clients and servers, in P2P applications a node may act as both a client and a server • Several applications based on this technology were launched, for example P2P file sharing by Napster, P2P communication by NNTP & Instant Messaging(IM) etc.
  • 6. PERCEPTION OF THE TWO TECHNOLOGIES • Following the norms of evolution of disruptive technologies, both VoIP and P2P were individually under-valued by traditional lead customers in their respective markets and were generating lower gross margins, in addition to being perceived as ‘‘low-end’’ by industry incumbents (Thomond et al., 2004)
  • 8. SKYPE • Global Internet Telephone Company based in Luxembourg that provides a quick, easy and cheap way for subscribers to make VoIP calls bundled with P2P technology • Founded by Niklas Zenstrom and Janus Friis • Features like Skype video/audio chat, Skype Out, Skype In, Skype Voicemail, Skype SMS • Tariffs considerably cheaper than traditional telcos and other VoIP platforms and ‘Skype to Skype’ totally free
  • 9. WHY SKYPE IS SUCCESSFUL • Voice quality as good as traditional telephones • Service of VoIP + P2P • User friendly (easy to install/use) • Privacy ensured by encrypted VoIP calls • Simple and effective promotion strategy, use of strong ‘word of mouse’ networks to build up a mass of users
  • 10. EFFECTS ON THE TELCO INDUSTRY • Telcoms forced to re-think their business models to reduce their costs • More and more players introducing VoIP services • Customer base shifting to Skype, stealing traditional player’s profits & threatening their existence • Competitors such as Viber, FaceTime, Tango, Google Hangouts, Jitsi, VoxOx and Goober rising in the market • The whole industry has gotten redefined
  • 11. REFERENCES • http://www.makeuseof.com/tag/fed-up-with-skype-here-are-6-of-thebest-free-alternatives/ • http://www.onlinemarketing-trends.com/2011/06/skypetimeline.html#.UopIYpJpkZF • http://are.berkeley.edu/~sberto/SkypeHype.pdf • http://faculty.poly.edu/~brao/skype.pdf • http://www.examiner.com/article/word-of-mouth-or-word-of-mouse