2013’s Top 10 Product Strategy Moves

Standard

2013’s Top 10 Product Strategy Moves

The verdict is out – for the technology industry, 2013 was a disappointment according to Quartz. Om Malik says – “Oh no, it wasn’t!”

Regardless of which camp you are in, it’s hard to argue that the major franchises in technology and business made big-time product strategy moves this year to invent or disrupt markets, grow or take share & change the rules. This article looks at 10 of the most memorable ones.

One Lens To Rule Them All
A few years ago, I came across Nilofer Merchant‘s list of proven techniques to change the competitive equation. The deck, replete with industry examples, is embedded below for those interested in the primer.

I made a Cliffs’ Notes-like summary (the full version is highly recommended!) that I’ve used over the years to look at how companies have used them over the decades.

2013 was no different – while the plays themselves surprised, delighted and even frustrated us at times, the underlying thinking goes back to techniques well understood and used as a playbook by the best in the business. Here we go, with the Top 10:

1. Commoditizing your Competitor’s Cash Cow

To say that the Office Suite is a cash cow for Microsoft is an understatement. In Q2 FY ’13, the division made $5.69 billion, approximately 20% of all revenue. This was a 10% decline over a 12-month period. During this period, the move to mobile (smartphones + tablet) only accelerated. As of Q1 2013, the world’s largest maker of PCs shipped more smartphones than PCs.

Taking advantage of its dominant mobile OS position, Apple made a bold move to commoditize Office 365’s $99 / year cash cow by offering up iWork (and iLife) for FREE to all new users of iOS as well as Macs.It remains to be seen if this directly disrupts Office’s moat built around enterprise users, but suffice it to say that Redmond is paying attention, as indicated in this official comment titled “Apples and Oranges” which casts this as merely an attempt to catch up.

2. Re-defining The Business You Are In + Turning a Luxury Into A Commodity

It’s safe to say that Uber (lifestyle meets logisticsis among the most disruptive (and useful) services we’ve seen grow over this year. So much so, that the laws around its existence and operation literally are being re-written.

Having a black car was part of a celebrity’s entourage – Uber has brought this within the reach of most, if not all people. In doing so, it has solved currency challenges, allowed passengers to easily split cab-fare, allow drivers to more easily afford their cars and addressed several other problems that have been holding up an innovation-starved transportation industry.

3a. Turning An Asset Into A Liability

The best example of this in 2013 was Snapchat. Used to be that the place for teens to hang out was Facebook. Well, until the parents showed up. I saw this first hand with my nephews during this past Labor Day weekend – the adults were on Facebook, while my nephews were on Snapchat, WhatsApp and Twitter. More than any other app, Snapchat has turned Facebook’s biggest asset (its user base) into a liability (core user cohorts leaving and, literally, taking their friends with them). The silver lining is that teens still spend time on Instagram, which is owned by Facebook and is in the photo sharing space.

3b. Turning A Liability Into An Asset

In the beginning of 2013, many were skeptical about Foursquare. Its v1 product was built for the social media over-sharing user who could “check-in” into a venue. Thanks to some solid passive geo-fencing technology and a v2 product that was built for the ‘other 90%’, the company leveraged its extensive database of check-ins and tips to create a recommendation service. Again, it’s early to tell where this goes but looks like what seemed a liability is now at the core of its biggest asset – the freshness of its content.

4. Selling A Lifestyle (And A Personal Image)

Instagram solved two user problems well – a) convert those pesky, unusable mobile phone photos into something valuable, even sleek and cool and b) make it brain-dead simple to share them. In doing these well, they rose beyond a successful app to promote a lifestyle. Almost every photos app which is competitive now has filters and emphasizes the simple sharing flow.

5. Transform Distribution

This definitely seems like the year that distribution of goods and key services was transformed – quite literally. Whether it is bringing farm-fresh food to your door step(Goodeggs), finding someone to run an errand or be your courier (Taskrabbit, Postmates),getting a ride (Lyft), letting your car earn its way while you are gone (Getaround), havinggrocery or high quality meals in hours (Instacart, Munchery)… the list goes on…. we even had private flying disrupted (Blackjet)… well, almost!

6. Taking On A By-stander

Given that users spent over 18 billion listening hours in 2013 (up from 1.8 billion hours in 2010) and the adjacency to industries it already participates in (Music), Apple attacking Pandora in music radio was a much expected & no-brainer move. Not to mention, Pandora was Top 3 mobile ad revenue generator in 2013. While Apple has not won (yet!) it’s a classic case of taking on a by-stander in a well understood industry to take (or protect) market share.

7. Attack From An Unexpected Direction

Two words – Apple Maps. Although the initial launch was the lone blot on the spotless product launch record (well, maybe not lone… considering MobileMe), the company has hunkered down, fixed bugs and launched key updates. In addition, usage led to the data getting better (as is the case with any Maps product). Further Apple has doubled down to make key acquisitions (Broadhop, WifiSLAM, Embark, Locationary etc.) to deliver public transit info., Wi-Fi based triangulation, better geocoding etc. In doing so, Apple attacked Google from an unexpected direction and took market share and 23M users in the US – something that would have been hard to predict earlier in the year. This is an area to watch in 2014 as mobile becomes more pervasive, in more countries.

8. Leverage Critical Mass To Execute Faster

Speaking of Apple, can Samsung be far behind? Whether it was the ‘phablet’ launches to round out the various form factors and corner over 63% of the Android market or the quick rush to market of their Watch and Smart TV products, Samsung continued its efforts to quickly replicate features and even products that might otherwise cause users to switch platforms. It’s bet on its own operating system Bada and its own partner ecosystem will be a play to watch in 2014.

9. Segmentation As A Weapon (To Focus)

The auto industry is simple (if not easy) to understand, product-wise – economy, mass-market, luxury. Tesla picked its early adopters and initial category (the luxury electric car) and delivered a product that won several loyal fans who had hitherto been forced to pick between looks and fuel economy. In doing so, they have found an initial base to monetize key innovations (such as the nationwide charging network) before moving to other categories thatclearly are clamoring for a version that fits their unique needs and price points. How they move from their core group of early adopters to the every man as the transition from the luxury to economy and mass-market segments will be really interesting to watch.

10. Get Help From Partners

There are a bunch of examples of this – Nokia taking advantage of the Windows Phoneplatform, Kindle Fire taking advantage of Android etc. (something Motorola had done earlier too, but not to the extent that Amazon did). Building on top of the core stack that it forked, Amazon attempted to own the web browsing layer – through its Silk product, in addition to building out an e-commerce services and customer support layer. Through this, it became the fastest growing Android tablet licensee of 2013.

Bonus! Changing The Rules

In pursuing a few different but elegantly connected moon shots, Google has leveraged its core business to try and change the rulesOn the infrastructure layer, Project “Loon” and Self-driving cars attempt to bring access at various levels. Innovations like Google Glass helps interact with this world. The work on Google NowMaps etc. offer newer versions of well-known services over existing as well as new infrastructure layers. All of this (even if unsuccessful its its current form) will help the ecosystem solve problems that allow users to live better and more connected / productive lives. 2014 will be interesting to see the impact of many of these efforts – which are, to be clear, in early stages for the most part.

Of course, this is only a limited set from the hundreds of plays made in 2013. Also, note that many of the illustrative examples are in consumer tech, but by no means is innovation or key strategic moves restricted to this industry. Please post moves in other industries in comments. I would love to hear your feedback.

Project Management : Make it Safe to Talk

Standard

Project Management : Make it Safe to Talk

In a meeting yesterday with some strong technical resources we were doing some amazing brainstorming.  Each had an opportunity to express themselves; each felt comfortable chiming in with their view; everyone discussing the object of concern and possible solutions, not the opinions expressed by others.  In other words if an idea was mentioned and someone else wanted to comment, they didn’t direct their comments at the person, but instead at the merits of the idea.  And the merits were discussed logically, not in an emotional way.  As the PM it was important to always steer the conversation to the objective aspects of what was being discussed, even to reframe the comments as this helps to make it safe to talk.

It is always good to come out of a collaborative session like that and it makes you appreciate collaborating with others to achieve some challenging outcome.  That is what brings us together in the work environment, to create, to enjoy others creativity and to create something together that is better than what we would have created on our own.

Contrast that with another meeting I was in where one of the business area leaders made  personal comments or innuendos directed at the person originating the idea, or the leader would look askance or raise one eyebrow.  The comments and body language, while slight, and out of context would seem almost harmless, had a very damaging effect during the meeting.  It shut down creative thinking and it stymied collaboration.  People stopped contributing and it ruined the atmosphere and synergy.

A meeting atmosphere that is not safe is not enjoyable and it kills creative energy.  It is draining, life-sapping and not an experience people enjoy.  The role of the PM is to strive to  foster an environment in which it is safe to talk, safe to express yourself and a joy to throw out your ideas spontaneously without being concerned about being criticized.  The PM must strive to uphold the aspects that make it a collaborative meeting, make it safe to talk and make it synergistic and enjoyable work environment.

Push technology From Wikipedia, the free encyclopedia

Standard
English: Illustration of CONWIP compared to pu...

English: Illustration of CONWIP compared to pull and push (Photo credit: Wikipedia)

English: Push-pull topology

English: Push-pull topology (Photo credit: Wikipedia)

A push-pull converter schematic

A push-pull converter schematic (Photo credit: Wikipedia)

Diagram of a Push-pull amplifier

Diagram of a Push-pull amplifier (Photo credit: Wikipedia)

English: This figure shows a WAP Push Process ...

English: This figure shows a WAP Push Process and the interaction of all instances involved. Deutsch: Ablauf eines WAP Push Vorgangs. Diese Grafik zeigt die beteiligten Instanzen und ihre Interaktion miteinander. (Photo credit: Wikipedia)

The image shows a technology push, mainly driv...

The image shows a technology push, mainly driven by internal R&D activities and market pull, driven by the external market forces.[1]. Shematic presentation of technology push and market pull[1]. (Photo credit: Wikipedia)

English: A push-pull amplifier

English: A push-pull amplifier (Photo credit: Wikipedia)

English: SMTP transfer model Blue arrows can b...

English: SMTP transfer model Blue arrows can be implemented by SMTP variations (Photo credit: Wikipedia)

Pull push principle.

Pull push principle. (Photo credit: Wikipedia)

Wikipedia Front Page

Wikipedia Front Page (Photo credit: szeke)

Celtic language Wikipedias over time ( Feb 06 ...

Celtic language Wikipedias over time ( Feb 06 – 07 ) (Photo credit: James Morrison)

Push technology

From Wikipedia, the free encyclopedia
Not to be confused with Push–pull technology.
This article’s lead section may not adequately summarize key points of its contents.Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (September 2012)

Push, or server push, describes a style of Internet-based communication where the request for a given transaction is initiated by the publisher or central server. It is contrasted with pull, where the request for the transmission of information is initiated by the receiver orclient.

General use[edit]

Push services are often based on information preferences expressed in advance. This is called a publish/subscribe model. A client “subscribes” to various information “channels” provided by a server; whenever new content is available on one of those channels, the server pushes that information out to the client.

Synchronous conferencing and instant messaging are typical examples of push services. Chat messages and sometimes files are pushed to the user as soon as they are received by the messaging service. Both decentralised peer-to-peer programs (such asWASTE) and centralised programs (such as IRC or XMPP) allow pushing files, which means the sender initiates the data transfer rather than the recipient.

Email may also be a push system: The SMTP protocol is a push protocol (see Push e-mail). However, the last step—from mail server to desktop computer—typically uses a pull protocol like POP3 or IMAP. Modern e-mail clients make this step seem instantaneous by repeatedly polling the mail server, frequently checking it for new mail. The IMAP protocol includes the IDLE command, which allows the server to tell the client when new messages arrive. The original BlackBerry was the first popular example of push-email in a wireless context.[citation needed]

Another example is the PointCast Network, which was widely implemented in the 1990s. It delivered news and stock market data. BothNetscape and Microsoft integrated it into their software at the height of the browser wars, but it was never popular and later faded away. Browsers replaced it in the 2000s with RSS (a pull system).

Other uses of push-enabled web applications include market data distribution (stock tickers), online chat/messaging systems (webchat), auctions, online betting and gaming, sport results, monitoring consoles, and sensor network monitoring.

Examples[edit]

HTTP server push[edit]

HTTP server push (also known as HTTP streaming) is a mechanism for sending unsolicited (asynchronous) data from a web server to aweb browser. HTTP server push can be achieved through any of several mechanisms.

Generally the web server does not terminate a connection after response data has been served to a client. The web server leaves the connection open so that if an event occurs (ex: change in internal data which needs to be reported to one or multiple clients), it can be sent out immediately; otherwise, the event would have to be queued until the client’s next request would have been received. Most web servers offer this functionality via CGI (e.g., Non-Parsed Headers scripts on Apache).

Another mechanism is related to a special MIME type called multipart/x-mixed-replace, which was introduced by Netscape in 1995. Web browsers interpret this as a document changing whenever the server feels like pushing a new version to the client.[1] It is still supported by FirefoxOpera, and Safari today, but it is ignored by Internet Explorer.[2] It can be applied to HTML documents, and also for streaming images in webcam applications.

The WHATWG Web Applications 1.0 proposal[3] includes a mechanism to push content to the client. On September 1, 2006, the Opera web browser implemented this new experimental system in a feature called “Server-Sent Events“.[4][5] It is now being standardized as part of HTML5.[6] Another related part of HTML5 is the WebSocket API, which allows a web server and client to communicate over a full-duplex TCP connection.

Pushlet[edit]

In this technique, the server takes advantage of persistent HTTP connections, leaving the response perpetually “open” (i.e., the server never terminates the response), effectively fooling the browser to remain in “loading” mode after the initial page load could be considered complete. The server then periodically sends snippets of JavaScript to update the content of the page, thereby achieving push capability. By using this technique, the client doesn’t need Java applets or other plug-ins in order to keep an open connection to the server; the client is automatically notified about new events, pushed by the server.[7][8] One serious drawback to this method, however, is the lack of control the server has over the browser timing out; a page refresh is always necessary if a timeout occurs on the browser end.

Long polling[edit]

Long polling is itself not a true push; long polling is a variation of the traditional polling technique, but it allows emulating a push mechanism under circumstances where a real push is not possible, such as sites with security policies that require rejection of incoming HTTP/S Requests.

With long polling, the client requests information from the server exactly as in normal polling, except it issues its HTTP/S requests (polls) at a much slower frequency. If the server does not have any information available for the client when the poll is received, instead of sending an empty response, the server holds the request open and waits for response information to become available. Once it does, the server immediately sends an HTTP/S response to the client, completing the open HTTP/S Request. In this way the usual response latency (the time between when the information first becomes available and the next client request) otherwise associated with polling clients is eliminated.

For example, BOSH is a popular, long-lived HTTP technique used as a long-polling alternative to TCP when TCP is difficult or impossible to employ directly (e.g., in a web browser);[9] it is also an underlying technology in the XMPP, which Apple uses for its iCloud push support.

Flash XMLSocket relays[edit]

This technique, used by Cbox and other chat applications, makes use of the XMLSocket object in a single-pixel Adobe Flash movie. Under the control of JavaScript, the client establishes a TCP connection to a unidirectional relay on the server. The relay server does not read anything from this socket; instead it immediately sends the client a unique identifier. Next, the client makes an HTTP requestto the web server, including with it this identifier. The web application can then push messages addressed to the client to a local interface of the relay server, which relays them over the Flash socket. The advantage of this approach is that it appreciates the natural read-write asymmetry that is typical of many web applications, including chat, and as a consequence it offers high efficiency. Since it does not accept data on outgoing sockets, the relay server does not need to poll outgoing TCP connections at all, making it possible to hold open tens of thousands of concurrent connections. In this model, the limit to scale is the TCP stack of the underlying server operating system.

See also[edit]

References[edit]

<Realtime’s push beats Ajax pull> [1]

External links[edit]

[show]