Browse Definitions :
Definition

disruptive technology

A disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.  

Harvard Business School professor Clayton M. Christensen coined the term disruptive technology. In his 1997 best-selling book, "The Innovator's Dilemma," Christensen separates new technology into two categories: sustaining and disruptive. Sustaining technology relies on incremental improvements to an already established technology. Disruptive technology lacks refinement, often has performance problems because it is new, appeals to a limited audience and may not yet have a proven practical application. (Such was the case with Alexander Graham Bell's "electrical speech machine," which we now call the telephone.)

Here are a few examples of disruptive technologies: 

  • The personal computer (PC) displaced the typewriter and forever changed the way we work and communicate.
  • The Windows operating system's combination of affordability and a user-friendly interface was instrumental in the rapid development of the personal computing industry in the 1990s. Personal computing disrupted the television industry, as well as a great number of other activities. 
  • Email transformed the way we communicating, largely displacing letter-writing and disrupting the postal and greeting card industries. 
  • Cell phones made it possible for people to call us anywhere and disrupted the telecom industry.
  • The laptop computer and mobile computing made a mobile workforce possible and made it possible for people to connect to corporate networks and collaborate from anywhere. In many organizations, laptops replaced desktops. 
  • Smartphones largely replaced cell phones and PDAs and, because of the available apps, also disrupted: pocket cameras, MP3 players, calculators and GPS devices, among many other possibilities. For some mobile users, smartphones often replace laptops. Others prefer a tablet.
  • Cloud computing has been a hugely disruptive technology in the business world, displacing many resources that would conventionally have been located in-house or provided as a traditionally hosted service. 
  • Social networking has had a major impact on the way we communicate and -- especially for personal use -- has disrupted telephone, email, instant messaging and event planning. 

In his book, Christensen points out that large corporations are designed to work with sustaining technologies. They excel at knowing their market, staying close to their customers, and having a mechanism in place to develop existing technology. Conversely, they have trouble capitalizing on the potential efficiencies, cost-savings, or new marketing opportunities created by low-margin disruptive technologies. Using real-world examples to illustrate his point, Christensen demonstrates how it is not unusual for a big corporation to dismiss the value of a disruptive technology because it does not reinforce current company goals, only to be blindsided as the technology matures, gains a larger audience and market share and threatens the status quo.

See also:  disruptive innovation, digital disruption, IT innovation, business innovation, IT transformation

This was last updated in December 2016

Continue Reading About disruptive technology

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Yesterday, I had 3 hrs class but I didn't understand sustained and disruptive innovations but thanks to God this morning I landed on this helpful site. Keep it up!
Cancel

-ADS BY GOOGLE

Extensiones de Documento y Formatos de Documento

Accionado por:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close