SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Does IT Matter ?  IT and the Corrosion of Competitive Advantage (2004) - Nicholas G Carr Week 6 The Economic Impact of IT  II  :  Beyond the Productivity Paradox
Introduction ,[object Object],[object Object]
Technological Transformations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- Inventions
Technological Transformations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Laying Tracks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An almost perfect commodity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An almost perfect commodity ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],An almost perfect commodity
Vanishing advantage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Vanishing advantage
Universal Strategy Solvent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Managing the money pit ,[object Object],[object Object],[object Object],[object Object],[object Object]
Managing the money pit ,[object Object],[object Object],[object Object]
A dream of wonderful machines ,[object Object],[object Object],[object Object],[object Object]
Nicholas G Carr ,[object Object],[object Object],[object Object],[object Object]
Thank You

Weitere ähnliche Inhalte

Ähnlich wie Book Reading - Does IT Matter - Nicholas Carr

Bus2.0 bhutan slides - megatrends
Bus2.0   bhutan slides - megatrendsBus2.0   bhutan slides - megatrends
Bus2.0 bhutan slides - megatrends
UNSW Canberra
 
Mc nurlin 03
Mc nurlin 03Mc nurlin 03
Mc nurlin 03
mt_magnum
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
SushmitaSah5
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
greendigital
 

Ähnlich wie Book Reading - Does IT Matter - Nicholas Carr (20)

Internet of things - 2016 trends.
Internet of things - 2016 trends. Internet of things - 2016 trends.
Internet of things - 2016 trends.
 
Challenges of IT Implementation
Challenges of IT ImplementationChallenges of IT Implementation
Challenges of IT Implementation
 
Bus2.0 bhutan slides - megatrends
Bus2.0   bhutan slides - megatrendsBus2.0   bhutan slides - megatrends
Bus2.0 bhutan slides - megatrends
 
Mc nurlin 03
Mc nurlin 03Mc nurlin 03
Mc nurlin 03
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki AilistoTeollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
Teollinen internet: mistä liiketoimintahyötyä? - Heikki Ailisto
 
Module_1_IT_ERA.pptx
Module_1_IT_ERA.pptxModule_1_IT_ERA.pptx
Module_1_IT_ERA.pptx
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
INFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptxINFORMATION & TECHNOLOGY.pptx
INFORMATION & TECHNOLOGY.pptx
 
ict.......pptx
ict.......pptxict.......pptx
ict.......pptx
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Enterprise 2.0 General
Enterprise 2.0 GeneralEnterprise 2.0 General
Enterprise 2.0 General
 
"Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?""Hosted IP Services: Fleeting Fad or Evolving Environment?"
"Hosted IP Services: Fleeting Fad or Evolving Environment?"
 
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalCrisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
 
Transforming the world with Information technology
Transforming the world with Information technologyTransforming the world with Information technology
Transforming the world with Information technology
 
Disruptive Technologies
Disruptive TechnologiesDisruptive Technologies
Disruptive Technologies
 
4 ir
4 ir4 ir
4 ir
 
The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)The fourth industrial power point presentation monday (003)
The fourth industrial power point presentation monday (003)
 
Xeditor at Tceurope
Xeditor at Tceurope Xeditor at Tceurope
Xeditor at Tceurope
 

Mehr von Ritesh Nayak

Fifthelephant teaser
Fifthelephant teaserFifthelephant teaser
Fifthelephant teaser
Ritesh Nayak
 
Panacea - Augmented Reality
Panacea - Augmented Reality Panacea - Augmented Reality
Panacea - Augmented Reality
Ritesh Nayak
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
Ritesh Nayak
 
Computing History Part 1
Computing History  Part 1Computing History  Part 1
Computing History Part 1
Ritesh Nayak
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2
Ritesh Nayak
 

Mehr von Ritesh Nayak (20)

muhive - public launch at Unpluggd
muhive - public launch at Unpluggdmuhive - public launch at Unpluggd
muhive - public launch at Unpluggd
 
Fifthelephant teaser
Fifthelephant teaserFifthelephant teaser
Fifthelephant teaser
 
Non verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tipsNon verbal communication, Indianisms and Resume writing tips
Non verbal communication, Indianisms and Resume writing tips
 
muHack - Language translation over telephony
muHack - Language translation over telephonymuHack - Language translation over telephony
muHack - Language translation over telephony
 
Panacea - Augmented Reality
Panacea - Augmented Reality Panacea - Augmented Reality
Panacea - Augmented Reality
 
MAS
MASMAS
MAS
 
Big Kahuna
Big KahunaBig Kahuna
Big Kahuna
 
Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...Information Technology, Space And The Built Environment: : The Death of the c...
Information Technology, Space And The Built Environment: : The Death of the c...
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th Century
 
The Transformation of Work in the Information Age
The Transformation of Work in the Information AgeThe Transformation of Work in the Information Age
The Transformation of Work in the Information Age
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Review of Book by Gary Fields
Review of Book by Gary FieldsReview of Book by Gary Fields
Review of Book by Gary Fields
 
The Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th CenturyThe Context For Information Technology Since The Late 20th Century
The Context For Information Technology Since The Late 20th Century
 
The Victorian Internet
The Victorian InternetThe Victorian Internet
The Victorian Internet
 
Thinking About It
Thinking About ItThinking About It
Thinking About It
 
Software Products and the software bottleneck
Software Products and the software bottleneckSoftware Products and the software bottleneck
Software Products and the software bottleneck
 
Sucess of Open Source - Steven Weber (Book Review)
Sucess of Open Source - Steven Weber  (Book Review)Sucess of Open Source - Steven Weber  (Book Review)
Sucess of Open Source - Steven Weber (Book Review)
 
Computing History Part 1
Computing History  Part 1Computing History  Part 1
Computing History Part 1
 
Computing History Part2
Computing History Part2Computing History Part2
Computing History Part2
 

Kürzlich hochgeladen

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Kürzlich hochgeladen (20)

Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 

Book Reading - Does IT Matter - Nicholas Carr

  • 1. Does IT Matter ? IT and the Corrosion of Competitive Advantage (2004) - Nicholas G Carr Week 6 The Economic Impact of IT II : Beyond the Productivity Paradox
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.