The Economics of QWERTY Jan Damsgaard Dept. of Informatics Copenhagen Business School This presentation is based on.

Slides:



Advertisements
Similar presentations
Using MIS 2e Chapter 3 Information Systems for
Advertisements

Using MIS 2e Chapter 3 Information Systems for
Selecting and implementing hospitality information systems
IT Technical Support Policies and Procedures South Nottingham College.
Chapter 20 Introduction to Systems Development and Systems Analysis Copyright © 2012 Pearson Education 20-1.
Managing Internet Portals Jan Damsgaard Dept. of Informatics Copenhagen Business School
Ford Baertlein, Jill Fery, Doug Hegney, Paul Harryman, Yu(Mimi) Qu.
Diffusion and Social Returns Outline Modelling the rate of adoption of an innovation Statistical evidence on rates of adoption Spillovers and social returns.
SIMS Strategic Computing and Communications Technolgy Course web page – Syllabus, schedule, lectures,
Introduction to Information Systems ISYS 263 David Chao.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lecture One: Introduction Managerial Economics Lecturer: Jack Wu.
Search Engines Jan Damsgaard Dept. of Informatics Copenhagen Business School
Recognizing Lock-In Jan Damsgaard Dept. of Informatics Copenhagen Business School This presentation is based on chapter.
(made ) Information Rules - Chapter 1: The Information Economy Carl Shapiro Hal R. Varian modifications by J.Molka-Danielsen.
1 Network Effect The old industrial economy: Economies of scale. Declining average cost The new information economy: Economics of networks. The value of.
© 2003 UMFK. 1-1 Network Utility Provider internet business models text and cases Tony Gauvin.
Internet Economics Traditional Reach and Richness tradeoff ? Flexibility of the web: Retial, Advertising, Customer Service etc. The Long Tail – Half google.
Health Informatics Series
David J. Bryce © 2003 The “New” Economy: The Economics of Information MANEC 387 Economics of Strategy MANEC 387 Economics of Strategy David J. Bryce.
Economics 124/PP 190-5/290-5 Innovation and Technical Change Standards and networks (2) Prof. Bronwyn H. Hall.
Current and Future of Enterprise IT David C Howell.
©2012 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
CH. 6 TECHNOLOGY-BASED INDUSTRIES AND THE MANAGEMENT OF INNOVATION ALLEN HICKS ANTHONY BROWN CHRISTIAN GRANDORF BRADEN WALKER.
Apple Computer: Transformation towards GUI Analysis and Revised Strategy presented by Walter J. Ferrier, Ph.D. CEO, Thoroughbred Consulting Group.
1.Training and education 2.Consulting 3.Travel 4.Hardware 5.Software Which of the following is not included in a firm’s IT infrastructure investments?
Yeager Pharmaceuticals “Always on time!”. The Company Yeager Pharmaceuticals currently warehouses and delivers medication and various medical supplies.
12 Building and Maintaining Information Systems.
The Internet’s Hardware Much of the hardware components that make up the Internet are owned or shared by thousands of private and public organizations.
 Hardware is every thing that goes into the computer system like;  The computer chip.  Keyboard.
Understanding Information Systems. Information System (IS) An IS is a combination of people, hardware, software, computer networks, and data that organizations.
Overview of Network Industries Nien-Pen Liu. Main Characteristics Consumption externalities Complements, compatibility and standards Switching costs and.
Enterprise Resource Planning Enterprise Resource Planning Systems is a computer system that integrates application programs in accounting, sales, manufacturing,
1 MP3 / MM740 Strategy & Information Systems Module 2: Strategy Concepts & Frameworks Fall 2002 © Copyright , John M. Gallaugher, Ph.D.
© Pearson Prentice Hall David Kroenke Using MIS 2e Chapter 3 Information Systems for Competitive Advantage.
Modern Competitive Strategy 3 rd Edition Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reservedMcGraw-Hill/Irwin.
Yahoo! Acquires Inktomi March 19 th, Yahoo!
David Kroenke Purposes of Information Systems Chapter 2 © 2007 Prentice Hall, Inc. 1.
Strengthening Partnerships: Shaping the Future Portland, OR June 6 th – 10 th, 2004 Jim Edgar MPA Montana Office of Vital Statistics Rollout Training Options.
David J. Bryce © 2003 The “New” Economy: The Economics of Information MANEC 387 Economics of Strategy MANEC 387 Economics of Strategy David J. Bryce.
Future of Web Business Arpad Horvath Department of Civil and Environmental Engineering University of California, Berkeley October 19, 2004.
An agreement between two or more individuals or entities stating that the involved parties will act in a certain way in order to achieve a common goal.
Question #3:   WHY IS IT NECESSARY TO PERFORM AN EXTERNAL AND INTERNAL ANALYSIS BEFORE THE FIRM CAN IDENTIFY ITS TRUE CORE COMPETENCIES? Group #2: M981Y207:
Chapter 2 Purpose of Information Systems. Agenda Information Systems Purposes Information Systems and Competitive Advantage Information Systems and Problem.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Chapter 6 Analyzing the Industry and Market. Copyright © Houghton Mifflin Company. All rights reserved.6 | 2 Learning Objectives Explain the industry.
SmartPhones in the United States
Electronic Data Interchange Systems
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 1 – Introduction to VoIP.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
Comparing Regional Environmental Governance in East Asia and Europe Environmental Governance in Asia Shunji MATSUOK Professor, Waseda University January.
Information System Analysis Implementation & Security.
Lesson Objectives To understand why computer systems must be reliable To investigate the consequences of an unreliable system.
MP3 / MD740 Strategy & Information Systems Nov. 3, 2004 Technology & Industry Competition.
PowerPoint Presentation by Charlie Cook Gordon Walker McGraw-Hill/Irwin Copyright © 2004 McGraw Hill Companies, Inc. All rights reserved. Chapter 2 Competitive.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Information Rules: A Strategic Guide to the Network Economy The Information Economy Carl Shapiro Hal R. Varian.
Information Rules: A Strategic Guide to the Network Economy The Information Economy Carl Shapiro Hal R. Varian.
Managing Lock-In Slides borrowed from Carl Shapiro, Hal R. Varian & modified By: Amine Benjelloun Sumanth Mallipeddi.
COMPUTER NETWORKS CS610 Lecture-20 Hammad Khalid Khan.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
Global Innovation Management VeMBA Business Models.
“Business first, technology's the tool.”. The Application Hosting business model is based on a very simple idea:  Install application software on powerful.
Using MIS 2e Chapter 3 Information Systems for
Lecture 6: Cloud Computing
IDS542 / MGTO 582 Business Models.
History of typewriter & Keyboard
Introduction to Network Economics
MICROSOFT WINDOWS HISTORY.
Software as a service (Saas)
Presentation transcript:

The Economics of QWERTY Jan Damsgaard Dept. of Informatics Copenhagen Business School This presentation is based on Paul A. David (1985) Clio and the economics of QWERTY The American Economic Review (75:2), pp

EBUSSJan Damsgaard Outline u The Controversy of QWERTY u The Story of QWERTY u The Lock-in of QWERTY u Lessons learned This presentation is based on Paul A. David (1985) Clio and the economics of QWERTY The American Economic Review (75:2), pp

EBUSSJan Damsgaard The controversy of QWERTY u Why QWERTYUIOP and not something else? u For example DVORAK with world records for speed typing? u U.S. Navy showed that DVORAK is faster u Seven other improvements rejected ( ) u Apple Computers equipped with switch from QWERTY to DVORAK

EBUSSJan Damsgaard The Story of QWERTY u 1867 patent for “TYPE WRITER” with QWERTY lay-out u Sales people could type the brand name using the top row only u Reduce the frequency of type bar clashes u Technical problems therefore strategic alliance with Remington (arms maker) u Entire stock of QWERTY 5,000 at the beginning of 1880’s and the annual production was 1200 in 1881

EBUSSJan Damsgaard Complex technical system u Actors –Manufacturers –Buyers –Operators –Trainers of operators u All part of an emergent complex technical system of production

EBUSSJan Damsgaard The lock-in of QWERTY u QWERTY become locked-in due to –Technical interrelatedness –Scale economies –Quasi irreversibility

EBUSSJan Damsgaard Technical interrelatedness u Systems compatibility between hardware and software –Physical lay-out of the keyboard –Memory of the lay-out by the typists u The buying of a QWERTY keyboard was a positive externality u Increases the likelihood that subsequent users will learn QWERTY

EBUSSJan Damsgaard System Scale Economies u Decreasing costs conditions –de facto standardization of just one lay-out u Polya Urn Scheme –Traditional economics t Decreasing returns, cost leader or differentiation –Network economics (W. Brian Arthur) t Increasing returns

EBUSSJan Damsgaard Quasi irreversibility u Sunk cost investments in QWERTY u The cost of hardware was coming down as the cost of software conversion was coming up u Competitors found it beneficial to make hardware compatible with the installed based of QWERTY typists rather than the other way around

EBUSSJan Damsgaard Lessons Learned u Technical interrelatedness, scale economics, and quasi irreversibility caused a lock-in to the wrong standard u Other examples –Britain's undersized railway wagons –The penalties of taking the lead u Lock-in to the wrong standards is common in the network economy

EBUSSJan Damsgaard Further evidence? u AOL INSTANT MESSENGER WILL NOT WORK WITH RIVALS u America Online has said that making its popular instant messaging u application compatible with rivals' products is too expensive. The u company will instead focus on establishing contracts with other vendors u allowing AOL to operate instant messaging systems for them. AOL and u other providers of instant messaging, including Microsoft and Yahoo, u have said for several years that they support interoperability, which u would allow their systems to work similar to phone lines, across u various providers. AOL conducted a test of interoperability last u summer. Although the test was successful, AOL said implementing the u system and addressing security would incur significant expense. Some u observers criticized AOL for apparently turning its back on u compatibility, saying AOL is choosing instead to guard its large base u of users. u Associated Press, 24 July 2002 u