Browse Definitions :
Definition

disruptive technology

A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.  

Harvard Business School professor Clayton M. Christensen coined the term disruptive technology. In his 1997 best-selling book, "The Innovator's Dilemma," Christensen separates new technology into two categories: sustaining and disruptive. Sustaining technology relies on incremental improvements to an already established technology. Disruptive technology lacks refinement, often has performance problems because it is new, appeals to a limited audience and may not yet have a proven practical application. (Such was the case with Alexander Graham Bell's "electrical speech machine," which we now call the telephone.)

Here are a few examples of disruptive technologies: 

  • The personal computer (PC) displaced the typewriter and forever changed the way we work and communicate.
  • The Windows operating system's combination of affordability and a user-friendly interface was instrumental in the rapid development of the personal computing industry in the 1990s. Personal computing disrupted the television industry, as well as a great number of other activities. 
  • Email transformed the way we communicating, largely displacing letter-writing and disrupting the postal and greeting card industries. 
  • Cell phones made it possible for people to call us anywhere and disrupted the telecom industry.
  • The laptop computer and mobile computing made a mobile workforce possible and made it possible for people to connect to corporate networks and collaborate from anywhere. In many organizations, laptops replaced desktops. 
  • Smartphones largely replaced cell phones and PDAs and, because of the available apps, also disrupted: pocket cameras, MP3 players, calculators and GPS devices, among many other possibilities. For some mobile users, smartphones often replace laptops. Others prefer a tablet.
  • Cloud computing has been a hugely disruptive technology in the business world, displacing many resources that would conventionally have been located in-house or provided as a traditionally hosted service. 
  • Social networking has had a major impact on the way we communicate and -- especially for personal use -- has disrupted telephone, email, instant messaging and event planning. 

In his book, Christensen points out that large corporations are designed to work with sustaining technologies. They excel at knowing their market, staying close to their customers, and having a mechanism in place to develop existing technology. Conversely, they have trouble capitalizing on the potential efficiencies, cost-savings, or new marketing opportunities created by low-margin disruptive technologies. Using real-world examples to illustrate his point, Christensen demonstrates how it is not unusual for a big corporation to dismiss the value of a disruptive technology because it does not reinforce current company goals, only to be blindsided as the technology matures, gains a larger audience and market share and threatens the status quo.

See also:  disruptive innovation, digital disruption, IT innovation, business innovation, IT transformation

This was last updated in December 2016

Continue Reading About disruptive technology

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Yesterday, I had 3 hrs class but I didn't understand sustained and disruptive innovations but thanks to God this morning I landed on this helpful site. Keep it up!
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

Close