Работайте офлайн с приложением Player FM !
The 3 Steps of a Digital Attacker Strategy (214)
Manage episode 429483728 series 2809700
This week’s podcast is about a common playbook for a digital attacker (whether a digital native or incumbent).
You can listen to this podcast here, which has the slides and graphics mentioned. Also available at iTunes and Google Podcasts.
Here is the link to the TechMoat Consulting.
Here is the link to the Tech Tour.
Here are the 3 steps of the digital attacker strategy.
- Step 1: A new digital tool enables a superior service to emerge. This is used to break into an existing business. This often causes an unbundling of the existing offerings.
- Step 2: Existing value chains get transformed. Everyone scrambles to grab the valuable positions.
- Step 3: The new leaders add services, complements and bundles.
------------
I write, speak and consult about how to win (and not lose) in digital strategy and transformation.
I am the founder of TechMoat Consulting, a boutique consulting firm that helps retailers, brands, and technology companies exploit digital change to grow faster, innovate better and build digital moats. Get in touch here.
My book series Moats and Marathons is one-of-a-kind framework for building and measuring competitive advantages in digital businesses.
This content (articles, podcasts, website info) is not investment, legal or tax advice. The information and opinions from me and any guests may be incorrect. The numbers and information may be wrong. The views expressed may no longer be relevant or accurate. This is not investment advice. Investing is risky. Do your own research.
221 эпизодов
Manage episode 429483728 series 2809700
This week’s podcast is about a common playbook for a digital attacker (whether a digital native or incumbent).
You can listen to this podcast here, which has the slides and graphics mentioned. Also available at iTunes and Google Podcasts.
Here is the link to the TechMoat Consulting.
Here is the link to the Tech Tour.
Here are the 3 steps of the digital attacker strategy.
- Step 1: A new digital tool enables a superior service to emerge. This is used to break into an existing business. This often causes an unbundling of the existing offerings.
- Step 2: Existing value chains get transformed. Everyone scrambles to grab the valuable positions.
- Step 3: The new leaders add services, complements and bundles.
------------
I write, speak and consult about how to win (and not lose) in digital strategy and transformation.
I am the founder of TechMoat Consulting, a boutique consulting firm that helps retailers, brands, and technology companies exploit digital change to grow faster, innovate better and build digital moats. Get in touch here.
My book series Moats and Marathons is one-of-a-kind framework for building and measuring competitive advantages in digital businesses.
This content (articles, podcasts, website info) is not investment, legal or tax advice. The information and opinions from me and any guests may be incorrect. The numbers and information may be wrong. The views expressed may no longer be relevant or accurate. This is not investment advice. Investing is risky. Do your own research.
221 эпизодов
Все серии
×Добро пожаловать в Player FM!
Player FM сканирует Интернет в поисках высококачественных подкастов, чтобы вы могли наслаждаться ими прямо сейчас. Это лучшее приложение для подкастов, которое работает на Android, iPhone и веб-странице. Зарегистрируйтесь, чтобы синхронизировать подписки на разных устройствах.