<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arthur Low</style></author><author><style face="normal" font="default" size="100%">Steven Muegge</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Keystone Business Models for Network Security Processors</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">business ecosystems</style></keyword><keyword><style  face="normal" font="default" size="100%">business model innovation</style></keyword><keyword><style  face="normal" font="default" size="100%">commercialization</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">platforms</style></keyword><keyword><style  face="normal" font="default" size="100%">semiconductors</style></keyword><keyword><style  face="normal" font="default" size="100%">technology entrepreneurship</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">07/2013</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/703</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">25-33</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the &quot;business ecosystem model for network security processors&quot;, includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i) the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii) the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.</style></abstract><issue><style face="normal" font="default" size="100%">7</style></issue><custom1><style face="normal" font="default" size="100%">Crack Semiconductor
Arthur Low is the founder and Chief Executive Officer of Crack Semiconductor, a supplier of high-performance cryptographic silicon IP used in some of the most demanding security applications. Arthur has a number of patents in the field of hardware cryptography. He has worked for a number of IC startups as a Senior IC designer and Architect and gained much of his fundamental IC design experience with Bell-Northern Research in the early 1990s and with IBM Microelectronics in the late 1990s. Arthur has a BSc degree in Electrical Engineering from the University of Alberta in Edmonton, Canada, and is completing his MSc degree in Technology Innovation Management in the Department of Systems and Computer Engineering at Carleton University in Ottawa, Canada. </style></custom1><custom2><style face="normal" font="default" size="100%">Carleton University
Steven Muegge is an Assistant Professor at the Sprott School of Business at Carleton University in Ottawa, Canada, where he teaches within the Technology Innovation Management (TIM) program. His research interests include open and distributed innovation, technology entrepreneurship, product development, and commercialization of technological innovation.</style></custom2></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arthur Low</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Making Money from Exploiting Schumpeterian Opportunities: John Sanguinetti and the Electronic Design Automation Industry</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">CynLib</style></keyword><keyword><style  face="normal" font="default" size="100%">EDA industry</style></keyword><keyword><style  face="normal" font="default" size="100%">integrated circuit design</style></keyword><keyword><style  face="normal" font="default" size="100%">John Sanguinetti</style></keyword><keyword><style  face="normal" font="default" size="100%">Schumpter</style></keyword><keyword><style  face="normal" font="default" size="100%">technology entrepreneurship</style></keyword><keyword><style  face="normal" font="default" size="100%">verilog</style></keyword><keyword><style  face="normal" font="default" size="100%">VHDL</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">05/2012</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/555</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">18-22</style></pages><abstract><style face="normal" font="default" size="100%">Accounts of the effect that John Sanguinetti’s two companies had on the market for integrated circuit design languages were used to gain insights on how to profit from the exploitation of Schumpeterian opportunities. This article will be of interest to entrepreneurs who expect to profit from exploiting opportunities that disrupt the status quo. To write this article, the author reviewed the literature on Schumpeterian and Kirznerian opportunities and examined the writings of and about Sanguinetti and his companies, blogs written by industry insiders, and articles in industry trade journals. Sanguinetti’s first company introduced a new technology and his second company introduced a new business strategy and a new technology. Both of Sanguinetti's companies undermined the capital investments of the established incumbents and created new value for customers. The article provides three main insights. First, deep knowledge and experience in the customer domain enable an entrepreneur to recognize and act to profit from a Schumpeterian opportunity. Second, to profit from a Schumpeterian opportunity the entrepreneur needs to combine technology and business model components in a way that adds significant value to customers. Third, large amounts of venture capital may or may not be required to exploit Schumpeterian opportunities. </style></abstract><issue><style face="normal" font="default" size="100%">5</style></issue><custom1><style face="normal" font="default" size="100%">Crack Semiconductor
Arthur Low is the founder and Chief Executive Officer of Crack Semiconductor, a supplier of high-performance cryptographic silicon IP used in some of the most demanding security applications. Arthur has a number of patents in the field of hardware cryptography. He has worked for a number of IC startups as a Senior IC designer and Architect and gained much of his fundamental IC design experience with Bell-Northern Research in the early 1990s and with IBM Microelectronics in the late 1990s. Arthur has a BSc degree in Electrical Engineering from the University of Alberta and is completing his MSc degree in Technology Innovation Management in the Department of Systems and Computer Engineering at Carleton University.
</style></custom1></record></records></xml>