Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Case Study (2)
- General Innovation Methodologies (2)
- Information Security (2)
- Innovation (2)
- Business model (1)
-
- Business reengineering (1)
- Business strategy (1)
- Commercialization of innovation (1)
- Entrepreneurship (1)
- Generating innovations (1)
- Identifying innovation opportunities (1)
- Infosys SET Labs (1)
- Infosys Technologies (1)
- Innovation Management (1)
- Innovation management (1)
- Maturity (1)
- Maturity Model (1)
Articles 1 - 6 of 6
Full-Text Articles in Business
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Strategic Assessment Of Information Security Maturity, Arcot Desai Narasimhalu, Dayasindhu Nagarajan, Raghavan Subramanian
Arcot Desai NARASIMHALU
CXOs are becoming increasingly interested in the information security maturity of their enterprises. This paper presents a CXO dashboard that will allow better management of the information security resources in an enterprise.
Innovation Engine, Arcot Desai Narasimhalu
Innovation Engine, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper describes a meta-model for innovation using an automobile engine as a metaphor. This innovation meta-model is used to manage a collection of innovation models. We develop an algorithm to identify innovations with potential for success using this meta-model. This meta-model can be used by corporations and individuals to identify plausible innovations at any given point in time.
Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu
Innovation Stack - Choosing Innovations For Commercialization, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
This paper describes a method for enterprises to order the innovations of interest according to a number of parameters including their own business strategy and core competencies. The method takes into account aspects such as ability to create entry barriers and complementary assets. Enterprises can now use this method to both filter out innovations that may not be of interest to them and then order the short listed or selected innovations according to their attractiveness.
Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu
Re-Engineering Xid Technologies - From Enterprise To Consumer Markets, Arcot Desai Narasimhalu
Arcot Desai NARASIMHALU
Several studies have addressed the process of taking ideas to markets but few have shared the experiences of start up companies that have reexamined their product strategies and repositioned their products and services for better revenues and profits. This paper reports the efforts related to repositioning of XID technologies, a start up company, into new markets while continuing to exploit its core technical competencies.
Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani
Crossing The Chasm: The Xid Technologies Story, Arcot Desai Narasimhalu, Roberto Mariani
Arcot Desai NARASIMHALU
XID Technologies is a face processing start up company built initially around a disruptive face recognition technology. The technology innovation came from Kent Ridge Digital Labs, a publicly funded software research laboratory in Singapore. Face recognition is the least intrusive and harmless among the various biometric solutions available in the market. The basic approach to human face recognition is to identify a robust feature set that was unique enough to differentiate amongst the many millions of human faces that the system was required to verify. The technology innovation used by XID framed the problem differently and thereby overcame the challenges …
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Infosemm: Infosys It Security Maturity Model: A Report, Arcot Desai Narasimhalu, N. Dayasindhu, Raghavan Subramanian
Arcot Desai NARASIMHALU
Businesses are faced with a continuing battle related to cyber security related issues ranging from cyber attacks all the way to cyber (information) war. These issues affect result in information, system, reputation, and revenue related risks. These risks arise because of vulnerabilities introduced in three major parts of the enterprise – infrastructure, intelligence and practices. This report provides a rating system for representing the security health of enterprises.