0% found this document useful (0 votes)
38 views12 pages

Strategic Issues in Product Life Cycle

Uploaded by

pworthin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views12 pages

Strategic Issues in Product Life Cycle

Uploaded by

pworthin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Question 1: Stages of product life cycle are: start-up, growth, maturity, decline and the issues

the firm needs to address during each of these stages are different. Discuss in scholarly detail

potential strategic issues your firm would need to address in each of these stages.

The fascinating concept I noted with product development life cycles is its striking

similarities to software development life cycles (SDLC). In the case of SDLC (depending on who

you ask—many software developing entities have varying phase definitions), they would be

inception, design, implementation, maintenance, auditing, and disposal. Other technology

products implement a cycle of phases—as noted in the question—of start-up, growth, maturity,

and decline. The similarities are rather remarkable.

The startup stage is when a new form of technology or a product is introduced to the

market. A pressing concern in this phase is advertising costs, which are at its highest rate for the

purposes of adequate exposure so that consumers are aware of its existence and to educate them

on the practical uses of the product. This is a stage in which I believe is most vital—there have

been a number of instances in which there was an existing technology that I never knew existed

simply because the business implementing it said very little about it and expected their

consumers to learn about it through their blogs and/or forum announcements—the latter of which

I personally prefer not to use due to the proliferating amounts of “trolls” and misinformation).

An excellent example of this is the concept of artificial intelligence language model

“GPT-3” (an abbreviation for “Generative Pre-trained Transformer”) that was developed by the

research and development company OpenAI. This technology can be used by developers and

ethical hackers to not only generate coding for a specific described purpose, but also

communicate in a near life-like conversation with an automated chatbot and learn further detailed
information about different computer science topics, the best programming languages to use,

operating system kernel layouts and much more. Since my discovery of this technology, this has

both expedited my production levels tenfold and deepened my understanding in the field of

penetration testing and ethical hacking, revealing dozens of breakthroughs I never would have

thought of myself. However, since OpenAI made no expenditures to advertise this

groundbreaking technology of theirs I--and various other colleagues—was completely unaware of

its existence and only randomly learned about it by word of mouth—specifically when coding

instructors began complaining and implementing rules after learning of students using this

technology to cheat by producing AI generated coding. This is a poor marketing strategy that

hinders growth and revenue and is akin to running a store with high demand merchandise but

failing to advertise your existence or even post a sign to attract customers, assuming consumers

will sooner or later hear about your store and visit. Consumers cannot invest in something they do

not know even exists.

The next stage is the growth stage, in which profit margins increase, which calls for an

uptick in production to adequately accommodate the climbing rate of consumer demand. In this

stage, it is important to focus on key performance indicators (KPI’s) such as efficiency, quality,

performance issues, timeliness and consumer feedback. (Notter, 2022). This is to streamline the

process of refining the product performance, strengthening its image and recognition, and

increasing its competitiveness in the market. Pricing appropriately should also be done

strategically—I am reminded of the instance in late 2007 in which the technology company

Apple introduced the first iPhone. It became so wildly popular that Apple’s CEO proudly

announced that he decided to drastically reduce its introductory price of $599 to $399—which

seriously infuriated many consumers who had already purchased the product for the significantly
higher price. (Apple would later elect to send rebates to consumers for the $200 discount they

would have saved).

The maturity stage of a product life cycle is, for lack of a better description, when a

product is “as good as it gets.” At this stage, costs for production and marketing steeply decline

and competition is typically at its fiercest at this point. This is the stage once again to stabilize

sales by evaluating vital KPI factors and identifying strengths and weaknesses, as well as

identifying consumer bases and target audiences that may not have been considered and

brainstorm innovate ways in which the product can be used to suit their goals and needs. A good

example of this Microsoft’s strategic decision to contract with various higher learning institutions

and tailoring their Office software suite to service college students as well as providing said

software suite for a reduced subscription cost rather than requiring a full license payment (which

was often notably exorbitant.)

The decline stage is when the product begins to lose its popularity, as noted in a market

share loss and waning interest in marketing efforts. Underlying causes for that generally stem

from market saturation in which other entities provide a similar product that is less expensive or

easier to acquire or when another product causes a disruption in technology and innovation that

results in the product becoming obsolete. This is the phase in which to decide whether to phase

out the product altogether or create a new improved version—the latter of which comes with

considerable risk of funding and revenue loss in the event the release of the improved version

fails to stir interest within the market. In most instances, companies simply elect to refrain from

any further promotion or marketing of the product and instead focus on strategies that would

maximize its profits as much as possible as its presence on the market concludes.
Question 2: How should managers develop buy-in from the various groups and areas within

the organization? Does getting the support of employees and other stakeholders require

strategic planning?

The support of stakeholders—which includes employees—is vital in determining

technology that will be implemented company wide. A perfect example of this is when I was

employed with Bosch Service Solutions in Berlin, Germany in 2013 as a software developer. An

outstanding issue at that time was that many developers preferred to work on Linux based

desktop systems while others preferred Windows or MacOS. This caused a serious strain in

relation to communications between systems, as files generated on operating systems foreign to

an operating system a receiver is using was often incompatible and needed to be saved in a

specific format. Coding on compilers from different OS’s was also a serious obstacle. Adding to

the headache was the fact that IT technicians were often well versed in one OS but not another,

meaning that if someone was having a technical issue on their Linux system and the on-call

technician was only an expert with Windows OS platforms, the developer would either need to

use another system or seek help over the phone from a technician in a Bosch office in Frankfurt.

Management addressed this issue by contracting with the virtual systems company Citrix

Systems and implemented an enterprise level cloud-based system called “Citrix in which a major

server would run virtualized versions of all three operating systems that could be access from any

terminal. Anyone needing to see or edit work from another OS could simply switch to that

particular OS on the cloud server and work with it from there.

However, we developers (as vital stakeholders) had not been consulted by management

about their decision to use an enterprise level virtual system from Citrix. Had any of us been

consulted for feedback, we would have all loudly protested this decision, as Citrix virtual systems
were considered the bane of a developer’s existence due to its notorious instability, nightmarishly

slow speeds with large amounts of information, and persistent loss of machine state (which would

result in a loss of data and subsequently wasted effort and salary costs).

What we dreaded would happen became a reality only months later as our network scaled

and productivity increased—our systems would “freeze” constantly, resulting in hours of lost

work. Saved machine states would randomly vanish—depending on the last time the machine

state had been saved, this meant that if your work had not been backed up in the last two weeks

or so, you might as well have told your project manager you were on vacation for two weeks

since all work from that point simply vanished into thin air. Despite technicians scrambling with

specialized developers from Citrix System to stabilize their virtual environment system, it simply

could not maintain trustworthy stability, resulting in developers wasting terabytes of diskspace

saving various machine states constantly. It was only after developers began resigning that Bosch

Service Solutions scrapped the Citrix cloud virtual system and elected to contract with VMware

Inc., who provided a much more stable cloud based virtual system.

It was a venture that costed Bosch Service Solutions over $200,000 in addition to

thousands of dollars wasted on developer salaries to redo lost work and the loss of some very

talented developers and coders who sought employment elsewhere. This would have been

avoided had feedback from stakeholders been taken into consideration first and further research

done on the product of interest for the business.


Question 3: Develop a strategic plan for your life. Using the definition of technology and the

management of technology we have learned, how would you expect the technologies in your

life to change and the value they deliver as you implement your strategic plan?

For my line of work as an ethical hacker and penetration tester, technology management

is paramount in order to be successful in my career. Moore’s Law—despite having been declared

dead or doomed to be obsolete by the year 2025—states that processor speeds will double every

year, which consistently creates rapidly advancing technology that businesses will implement…

and more innovated way for cybercriminals to manipulate this technology for nefarious purposes.

Our never-ending jobs as ethical hackers is to discover possible flaws in this technology before

criminals do. One excellent example of this is an MIT student who discovered a critical flaw in

the blockchain technology that cryptocurrency medium Wormhole was using—the vulnerability

he discovered, had it been noticed by a criminal, would have allowed an attacker execute a

ransomware attack by taking over a blockchain network and holding it hostage for his specified

amount of money, causing a loss of $736 million in assets (This student received an astounding

$10 million reward for this discovery).

This is an excellent example of how important it is for ethical hackers to stay constantly

informed of the existing technology—even technology that is not personally of interest to them.

As our most shared saying goes: “It’s not a matter of if, but when.” Criminals will find a way to

subvert protocols and technologies and defeat its security implementations. Given this fact, I

manage technology not only by being involved with various forums that are based on hacking,

but I continuously subscribe to magazines about any technology that uses a form of networking

or has the ability to use a form of networking (Even with children’s toys—in 2017, a hacker used
an internet connected teddy bear called “Cloudpet” to gain access to a customer database

containing passwords, email addresses, and personal recordings saved by the customers and held

it hostage for a ransom.)

Discord channels have also been a very rich source of managing technology, as not only

are there channels dedicated to ethical hacking, but there are countless channels dedicated to

topics such as new programming languages, kernel architecture and design, and proof of concept

discoveries for zero-day vulnerabilities. These are all concepts and themes I need to be aware of

regularly. While a webserver might be declared secure having been tested with various Python,

C/C++, and scripting attacks—do I want to make myself liable by declaring something safe, only

for someone to implement an attack with a new programming language such as Go or Swift, all

because I was not willing to learn about this new technology?


Question 4: How would you asses the areas of sustainability, corporate social responsibility

and ethics within your organization?

Corporate social responsibility is about public image—this include finding innovative

methods to enhance and contribute to society. This particular topic, I believe, strongly aligns

itself with the instituted company mission that was conceived during the engineering and design

of the company itself. This should not collectively imply that all businesses should exist to serve

the public trust (as we all know that many corporations are notorious for being the antithesis of

that) or engage in philanthropic endeavors, but there are ways for a company to preserve their

public imagine while still operating and generating healthy profits.

In a previous technology management class, I studied about the importance of

maintaining written guidelines and policies for every known possible scenario and holding

employees accountable to these guidelines. This business strategy, in my opinion, is the strongest

method of maintaining social responsibility as well as boosting morale within the workplace. I

will gladly elaborate further on this matter.

For example, many people have experienced business who maintain strict written policies

on behavior on social media, forbidding them from mentioning the company by name or

discussing any internal events that have occurred. This is to insure that the company’s brand and

image is not be improperly tarnished and that false or misleading information about the company

is being broadcasted. Conversely (and surprisingly enough) even posting positive and/or

promotional information about an employer can lead to legal consequences if the author of the

post fails to mention that he is employee of the company—inviting sanctions and lawsuits from

the Federal Trade Commission for unfair competition (Jackson, 2016)


Guidelines also boost morale within the internal operations of a corporation. Excellent

examples of this include maintaining a strict policy about customer confidentiality and data

handling, which gives customers the confidence that their personal information is secure with the

company and its employees—instituting a firm bond of trust that solidifies the company’s public

image. Guidelines also can be instituted to hold employees accountable if they are knowledgeable

about a violation of rules of policies that endanger either the company’s image or any form of

customer asset attained by the company.

I have also seen guidelines that discuss environmental concerns, specifically the use of

energy by the company’s equipment. Usually, specific personnel would be assigned to review the

energy usage and search for more energy friendly pieces of technology if it is deemed that an

unreasonable amount of energy is being used.


Question 5: Discuss the steps in innovation project management.

The first step in any form of project management is to properly identify an objective and

formulate a scope. A scope is a set of parameters that identify relevance to the direct needs of the

project as well as any constraints and limitations, and how they align with the project objective. A

project without a clear objective is in danger of disorganized operation, which would result in

issues such as premature project fund depletion, overdue conclusion of the project, or discovery

of unforeseen situations that render the project impossible or too expensive to complete. During

this phase, variables to the project such as stakeholders, costs and budgets, limitations, and a

work breakdown structure are identified and discussed in detail.

The next crucial step in innovation project management is risk identification. In my

opinion, this is the most crucial part of any project plan. This phase will identify risks that not

only would endanger the project but would endanger business operations and/or its relative

customers. Such risks can include content violation, copyright infringements, insufficient staff, or

signal interference, or service availability issues. Other factors such as environmental factors,

harm to stakeholders, and limited funding to maintain the costs of the ending product results

should also be considered. With each identified risk factor, a probability, impact, and danger

rating are assigned, and a mitigation plan is formulated for each one.

Cost and budget analysis is usually the next step. This step is to formulate a tangible cost

of all factors such as equipment, external working contracts with third party agencies, salaries,

and operational costs. This phase is also an excellent time to definitively validate the concepts of

the project entirely, calculate an expected return on investment, and formulate an expected

viability ratio of the project’s success. A growth plan can also be formulated here to determine
how to expand the product’s capabilities as the business itself expands. From there, a schedule

can be dictated, and all figures presented to management for approval.


References:

Notter J. Adapt Company Culture KPIs to the Hybrid Workplace. TD: Talent Development.

2022;76(5):54-58.

Jackson, Amy; Article “Is it Illegal to Criticize Your Employer on Social Media?”; November 16,

2016; [Link]

You might also like