SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Weaver Benjamin) srt2:(2007-2009)"

Search: WFRF:(Weaver Benjamin) > (2007-2009)

  • Result 1-8 of 8
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Adewumi, Oluseun, et al. (author)
  • Characterization of human embryonic stem cell lines by the International Stem Cell Initiative
  • 2007
  • In: Nature Biotechnology. - : Springer Science and Business Media LLC. - 1087-0156 .- 1546-1696. ; 25:7, s. 803-816
  • Journal article (peer-reviewed)abstract
    • The International Stem Cell Initiative characterized 59 human embryonic stem cell lines from 17 laboratories worldwide. Despite diverse genotypes and different techniques used for derivation and maintenance, all lines exhibited similar expression patterns for several markers of human embryonic stem cells. They expressed the glycolipid antigens SSEA3 and SSEA4, the keratan sulfate antigens TRA-1-60, TRA-1-81, GCTM2 and GCT343, and the protein antigens CD9, Thy1 (also known as CD90), tissue- nonspecific alkaline phosphatase and class 1 HLA, as well as the strongly developmentally regulated genes NANOG, POU5F1 (formerly known as OCT4), TDGF1, DNMT3B, GABRB3 and GDF3. Nevertheless, the lines were not identical: differences in expression of several lineage markers were evident, and several imprinted genes showed generally similar allele-specific expression patterns, but some gene-dependent variation was observed. Also, some female lines expressed readily detectable levels of XIST whereas others did not. No significant contamination of the lines with mycoplasma, bacteria or cytopathic viruses was detected.
  •  
2.
  • Kalling, Thomas, et al. (author)
  • IP Challenges to Integrators
  • 2008
  • Reports (pop. science, debate, etc.)abstract
    • This memo focuses the challenges brought upon traditional security integrators as a result of the digitalisation of services through the assimilation of IP-connectable security products. Challenges to security integrators: • Develop an ROI thinking, including demonstrating the extended functionality, the scalability of IP networks, and being able to offer hybrid solutions. • Being able to sell to CIOs, CFOs, CEO’s and other executives. • Being able to demonstrate real IP success cases, and not just rely on theory, logic and rhetoric. • Develop the necessary technical, sales, sourcing and logistics competence, while at the same time being able to develop other strategic initiatives.
  •  
3.
  • Weaver, Benjamin (author)
  • 'Convergence' in the security industry – definitions, drivers and consequences
  • 2008
  • Reports (pop. science, debate, etc.)abstract
    • Drawing on a combination of empirical industry observations and management literature, this document at- tempts to shed some light on the usage of the term ‘convergence’ that can be identified within the security sector. The aim is to provide both a typology of definitions and a discussion of some of the strategic implica- tions of different types of convergence. A basic distinction is made between convergence on the demand-side (inside enterprise organizations) and the supply-side (technology and products and services). Demand-side convergence is identified as a unified approach to security that entails tearing down the organizational walls that separate the physical security, IT and information security functions. This notion of convergence is fo- cused on the organization of security work in terms of people, processes and technology. On the supply side, technological convergence is identified as a set of concurrent trends that have enabled the shift towards intel- ligent network devices. At the product (and service offering) level, a distinction is made between convergence in substitutes (e.g. IP cameras replacing analog cameras) and convergence in complements (e.g. bundling of software, hardware and services). Seen from an industry perspective, these two types of convergence have different consequences. The former potentially leads to an industry shakeout, where entrant companies chal- lenge incumbents’ dominant positions, while the latter may lead to alliance seeking and vertical integration.
  •  
4.
  • Weaver, Benjamin, et al. (author)
  • From security system integrator to total solution provider
  • 2008
  • Reports (pop. science, debate, etc.)abstract
    • As the electronic security sector converges with IT security, traditional security systems integrators are coming under pressure to redefine their business models. By not acting now, a traditional SI may see their addressable market share snapped up by aggressive IT entrants who absorb the most profitable projects and customers, leaving security SIs to fight over lower-margin work such as the installation of fire and intrusion detection. Clearly, security SIs that want to survive in a future dominated by IT and IP security technologies will have to adapt and change. This memo focuses on one of the possible strategies that security SIs could adopt – that of becoming a total solution provider for outsourced electronic security services.
  •  
5.
  • Weaver, Benjamin (author)
  • Get it Right, Now: Focus on building a successful VAR business
  • 2009
  • In: Security Dealer & Integrator. - 1941-0891.
  • Journal article (pop. science, debate, etc.)abstract
    • Although the challenges posed by convergence are many, incumbent security integrators and VARs who get it right have everything to gain. Although they might not be able to acquire the leading-edge capabilities of some of their IT competitors, the integrator’s firm grasp of all aspects of traditional security, their unique ability to integrate old with new technology, and perhaps most importantly, their knowledge of the market and its end-users, will give them a unique advantage in becoming successful in the converged market.
  •  
6.
  • Weaver, Benjamin (author)
  • IP security – a disruptive or sustaining technology shift?
  • 2009
  • Reports (pop. science, debate, etc.)abstract
    • The shift towards IP-based security products and systems is often touted as an example of a disruptive technology that have had – and will continue to have – profound consequences for the electronic security industry as a whole. Based on Clayton Christensen’s theories on disruptive innovation, this document argues that the in- troduction of IP-based technology has different effects depending on the product segment observed. In the case of video surveillance, it is argued that IP has brought about a disruptive change, whereas the effect on access control is found to be more of an incremental, or sustaining character. These conclusions are based partly on an analysis of the impact of IP technology on product platforms, and partly on observations of changes in industry structure that can be observed in the video surveillance and access control sectors.
  •  
7.
  • Weaver, Benjamin (author)
  • Research proposal: Industry convergence - Driving forces, factors and consequences
  • 2007
  • In: ; , s. 1-20
  • Conference paper (peer-reviewed)abstract
    • Industry convergence – the merger of hitherto separate industries – is a phenomenon that has had a profound effect on several industries and received considerable interest among practitioners and business press over the past decades. Despite this, industry con- vergence has only received limited attention from the academic management field, al- though an emergent discussion on convergence can be identified. Prior research is limited by a lack of coherent theoretical definitions of convergence, and a tendency to focus on technological aspects rather than on consequences for industry structure and individ- ual firms. Moreover, there is lack of empirical work in actual convergent industry set- tings. This research proposal reviews some of the literature on convergence to date, in order to develop a theoretical framework of industry convergence that takes drivers, types and consequences on industry and firm level into account. The preliminary frame- work positions industry convergence as being conceptually and causally distinct from technology convergence, although the two are often intrinsically linked. Industry con- vergence is defined as a process whereby two or more industries – made up of producers of substitute products – converge over time, and where the outcome is uncertain with many alternatives. Two main types of industry convergence are proposed, convergence in substitutes and convergence in complements. With a view to increase the understanding of industry convergence, the preliminary theoretical framework will be applied in a longitudinal case study of the electronic security industry. This sector is currently converging with the IT industry, a process mainly driven by the pervasiveness of Internet Protocol (IP) networking technology, that allows the integration of a number of previously separate security and information systems.
  •  
8.
  • Weaver, Benjamin (author)
  • Security industry convergence – bridging the knowledge divide
  • 2007
  • Reports (pop. science, debate, etc.)abstract
    • Convergence in the electronic security industry entails the meeting of two very different business cultures, which is currently manifesting itself in the form a knowledge gap. In view of this, the crucial strategic resources needed to succeed in the converged electronic security market of tomorrow will be a combination of competences, ca- pabilities and skills sets – or knowledge, in short – drawn from both the security and IT industries. This knowl- edge can be divided into three main categories: technological, business-related and cultural.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-8 of 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view