Which companies have been most successful in pivoting their business model?

Does your business model make sense? Just because it did at one time doesn't mean it still does now. No one understands this better than these five companies that went back to the drawing board to reestablish their claim on their respective markets, or those markets they broke into as a result ofrecognizing a different need that their products or services could solve. As MSPs, it may be time to rethink the way you do business.See our list!Did we miss any?
How about companies that have tried and failed?
Have you had success in pivoting your business model?
This topic first appeared in the Spiceworks Community

Very Interesting Bart.  Strangely, the guys who wrote Chapter 8 of the new book are colleagues and co-authors with my dissertation advisor at Manchester Business School
You should have a look at the new book we just put out.  Let me know if you'd like a copy.  We looked at business networks from a higher level strategic perspective as compared to the more systems level approach it appears this group has taken.
http://www.amazon.com/Business-Network-Transformation-Reconfigure-Relationships/dp/0470528346

Similar Messages

  • Have been using successfully Acrobat 8 Standard, version 8.3.1 for years.  Suddenly can not digitally sign anything because software can not find "existing digital ID file?

    Have been using successfully Acrobat 8 Standard, version 8.3.1 for years.  Suddenly can not digitally sign anything because software can not find "existing digital ID file?

    Are you still using Acrobat 8? If not read further.
    All Acrobat versions prior to 11.0.07 had a security flaw that they allows signing with certificates that had "Extended Key Usage" (EKU) restricted to certain certificate uses and those did not include document signing. Most frequently those were certificates with "Client Auth" or "Server Auth" in EKU. Acrobat/Reader 11.0.07 fixed this problem, which also means that while previous versions accepted such certificates for signing 11.0.07 and later do not.

  • Be grateful for your help with Photoshop Elements which I have been using for several years.

    Be grateful for your help with Photoshop Elements which I have been using for several years.  Does Elements need to have access to ‘My Pictures’ on Windows as when I remove Photos from ‘My Pictures’, Elements later, when backing up, gives a message that it is unable to ‘reconnect’ to the same picture on elements.  On other occasions when removing a photo from Elements catalogue I also get a similar message when backing up saying ‘unable to reconnect’.  1. Is there a relationship between Elements and My Pictures and is Elements dependant on    the Windows ‘My Pictures’? 2. Why does some photos in Elements in some cases cause them to multiply e.g. double; triple; quadruple; and on occasions even more?  Is there something I need to do to stop this or an easy way I can remove the multiples without spending hours doing it manually one by one?  Am I doing something wrong? My O/S is Windows XP SP2 and windows Vista on my Laptop.  I have been using Elements 5 and have just purchased Photoshop Elements 8.0. (Upgrade) and about to install it. Be grateful for any advice as I do enjoy using the program if only I can resolve this issue.  I am not a PC wiz and mainly use Elements to catalogue photos from which I compile collections and from them slide shows with music.  Any advice appreciated Sonny.t PS Have tried to post this previously but without success so hoping to see message appear and a +response

    The organizer doesn't care where you send your photos when you download them via the downloader or where they happen to be when you first bring them in if you use the Get Photos command, but once your pics are in the Organizer, you *must* move them from within organizer or it can't find them. You don't have to use My Pictures at all if you don't want to, but regardless of the folder where you put your photos, if you want them someplace else, you use organizer to do it.

  • How do I know which commands have been pushed to switch by PI CLI template

    We have PI version 1.3. I tried to deploy the built-in CLI template "vlan" just to create a vlan. I run the template and input vlan ID and name. The job is shown as successful in PI but the vlan is not created on the switch. In the transcript part of the job history, it only shows "configlet:response: config t". Please see the attachment for the screen shot. How do I know which commands have been pushed to the switch by the CLI template? How does PI push the CLI template to the switch? via snmp or telnet? I tried to run "debug tacacs authentication" and "debug tacacs accounting" on the switch because the switch is configured for command authentication and command accounting but I don't see any commands in the debug. It looks PI did not push any commands to the switch. Please help me to troubleshoot this.
    Thanks.

    The MPEG 2 Playback Component required by Streamclip is an optional purchase.
    http://store.apple.com/us/product/D2187Z/A
    There are other converters that can handle MPEG-2 files; try Handbrake.
    Regards.

  • I have a mid2009 MacBook Pro for which I have been using a USB WD HD for Time Machine.  I'd like to get a wireless HD  and start a new Time Machine backup for this Mac and retire the 5  year old WD drive.  Can I start over?

    I have a mid2009 MacBook Pro running Mavericks for which I have been using a USB WD HD for Time Machine.  I'd like to get a wireless HD  and start a new Time Machine backup for this Mac and retire the 5  year old WD drive.  Can I start over?

    no archive/ backup is perfect, HD clones can be set to make incremental additions, same as time machine however, though they are more time involved in doing so.
    See the + and - of all data backup/ archives below and "spread it around".... or the "dont put your eggs all in one basket" philosophy.
    Peace
    Data Storage Platforms; their Drawbacks & Advantages
    #1. Time Machine / Time Capsule
    Drawbacks:
    1. Time Machine is not bootable, if your internal drive fails, you cannot access files or boot from TM directly from the dead computer.
    2. Time machine is controlled by complex software, and while you can delve into the TM backup database for specific file(s) extraction, this is not ideal or desirable.
    3. Time machine can and does have the potential for many error codes in which data corruption can occur and your important backup files may not be saved correctly, at all, or even damaged. This extra link of failure in placing software between your data and its recovery is a point of risk and failure. A HD clone is not subject to these errors.
    4. Time machine mirrors your internal HD, in which cases of data corruption, this corruption can immediately spread to the backup as the two are linked. TM is perpetually connected (or often) to your computer, and corruption spread to corruption, without isolation, which TM lacks (usually), migrating errors or corruption is either automatic or extremely easy to unwittingly do.
    5. Time Machine does not keep endless copies of changed or deleted data, and you are often not notified when it deletes them; likewise you may accidently delete files off your computer and this accident is mirrored on TM.
    6. Restoring from TM is quite time intensive.
    7. TM is a backup and not a data archive, and therefore by definition a low-level security of vital/important data.
    8. TM working premise is a “black box” backup of OS, APPS, settings, and vital data that nearly 100% of users never verify until an emergency hits or their computers internal SSD or HD that is corrupt or dead and this is an extremely bad working premise on vital data.
    9. Given that data created and stored is growing exponentially, the fact that TM operates as a “store-it-all” backup nexus makes TM inherently incapable to easily backup massive amounts of data, nor is doing so a good idea.
    10. TM working premise is a backup of a users system and active working data, and NOT massive amounts of static data, yet most users never take this into consideration, making TM a high-risk locus of data “bloat”.
    11. In the case of Time Capsule, wifi data storage is a less than ideal premise given possible wireless data corruption.
    12. TM like all HD-based data is subject to ferromagnetic and mechanical failure.
    13. *Level-1 security of your vital data.
    Advantages:
    1. TM is very easy to use either in automatic mode or in 1-click backups.
    2. TM is a perfect novice level simplex backup single-layer security save against internal HD failure or corruption.
    3. TM can easily provide a seamless no-gap policy of active data that is often not easily capable in HD clones or HD archives (only if the user is lazy is making data saves).
    #2. HD archives
    Drawbacks:
    1. Like all HD-based data is subject to ferromagnetic and mechanical failure.
    2. Unless the user ritually copies working active data to HD external archives, then there is a time-gap of potential missing data; as such users must be proactive in archiving data that is being worked on or recently saved or created.
    Advantages:
    1. Fills the gap left in a week or 2-week-old HD clone, as an example.
    2. Simplex no-software data storage that is isolated and autonomous from the computer (in most cases).
    3. HD archives are the best idealized storage source for storing huge and multi-terabytes of data.
    4. Best-idealized 1st platform redundancy for data protection.
    5. *Perfect primary tier and level-2 security of your vital data.
    #3. HD clones (see below for full advantages / drawbacks)
    Drawbacks:
    1. HD clones can be incrementally updated to hourly or daily, however this is time consuming and HD clones are, often, a week or more old, in which case data between today and the most fresh HD clone can and would be lost (however this gap is filled by use of HD archives listed above or by a TM backup).
    2. Like all HD-based data is subject to ferromagnetic and mechanical failure.
    Advantages:
    1. HD clones are the best, quickest way to get back to 100% full operation in mere seconds.
    2. Once a HD clone is created, the creation software (Carbon Copy Cloner or SuperDuper) is no longer needed whatsoever, and unlike TM, which requires complex software for its operational transference of data, a HD clone is its own bootable entity.
    3. HD clones are unconnected and isolated from recent corruption.
    4. HD clones allow a “portable copy” of your computer that you can likewise connect to another same Mac and have all your APPS and data at hand, which is extremely useful.
    5. Rather than, as many users do, thinking of a HD clone as a “complimentary backup” to the use of TM, a HD clone is superior to TM both in ease of returning to 100% quickly, and its autonomous nature; while each has its place, TM can and does fill the gap in, say, a 2 week old clone. As an analogy, the HD clone itself is the brick wall of protection, whereas TM can be thought of as the mortar, which will fill any cracks in data on a week, 2-week, or 1-month old HD clone.
    6. Best-idealized 2nd platform redundancy for data protection, and 1st level for system restore of your computers internal HD. (Time machine being 2nd level for system restore of the computer’s internal HD).
    7. *Level-2 security of your vital data.
    HD cloning software options:
    1. SuperDuper HD cloning software APP (free)
    2. Carbon Copy Cloner APP (will copy the recovery partition as well)
    3. Disk utility HD bootable clone.
    #4. Online archives
    Drawbacks:
    1. Subject to server failure or due to non-payment of your hosting account, it can be suspended.
    2. Subject, due to lack of security on your part, to being attacked and hacked/erased.
    Advantages:
    1. In case of house fire, etc. your data is safe.
    2. In travels, and propagating files to friends and likewise, a mere link by email is all that is needed and no large media needs to be sent across the net.
    3. Online archives are the perfect and best-idealized 3rd platform redundancy for data protection.
    4. Supremely useful in data isolation from backups and local archives in being online and offsite for long-distance security in isolation.
    5. *Level-1.5 security of your vital data.
    #5. DVD professional archival media
    Drawbacks:
    1. DVD single-layer disks are limited to 4.7Gigabytes of data.
    2. DVD media are, given rough handling, prone to scratches and light-degradation if not stored correctly.
    Advantages:
    1. Archival DVD professional blank media is rated for in excess of 100+ years.
    2. DVD is not subject to mechanical breakdown.
    3. DVD archival media is not subject to ferromagnetic degradation.
    4. DVD archival media correctly sleeved and stored is currently a supreme storage method of archiving vital data.
    5. DVD media is once written and therefore free of data corruption if the write is correct.
    6. DVD media is the perfect ideal for “freezing” and isolating old copies of data for reference in case newer generations of data become corrupted and an older copy is needed to revert to.
    7. Best-idealized 4th platform redundancy for data protection.
    8. *Level-3 (highest) security of your vital data. 
    [*Level-4 data security under development as once-written metallic plates and synthetic sapphire and likewise ultra-long-term data storage]
    #6. Cloud based storage
    Drawbacks:
    1. Cloud storage can only be quasi-possessed.
    2. No genuine true security and privacy of data.
    3. Should never be considered for vital data storage or especially long-term.
    4. *Level-0 security of your vital data. 
    Advantages:
    1. Quick, easy and cheap storage location for simplex files for transfer to keep on hand and yet off the computer.
    2. Easy source for small-file data sharing.

  • HT1390 Hi, I rented 4 movies last night which I have been charged for however seem to have disappeared from my iTunes. I have not watched any of them or opened them. Can you please tell me whats happened?

    Hi, I rented 4 movies last night which I have been charged for however seem to have disappeared from my iTunes. I have not watched any of them or opened them. Can you please tell me whats happened?

    While we all have MacBooks in this forum most of us don’t have Lion. There's a Lion Support Community where everybody has Lion.You should also post this question there.  https://discussions.apple.com/community/mac_os/mac_os_x_v10.7_lion

  • In Adobe Acrobat 9 which I have been using for a long time (Widows 7) says, You cannot use this prod

    In Adobe Acrobat 9 (Wndows 7) which I have been using for a long time now it says I cannot use it withoutv repairing.  It instructs me to uninstall & reinstall...

    I have not run into this yet with my AA9 and Win7, but have been seeing posts about it. I would try a repair before I would do an uninstall and reinstall. You might also turn off javascript for a bit in case there has been some javascript that has caused problems (ok, making wild guesses). If you do decide to uninstall, be sure to deactivate first, uninstall, run http://labs.adobe.com/downloads/acrobatcleaner.html, and remove any left over parts of the Acrobat folder. Then proceed to the reinstall and updates.
    There is a question about whether being able to use it is correct, or you are just getting some message that is a spam that somehow got into your system (again, a possible javascript issue). Besides turning off javascript, you could also try isolating the javascripts to moving them to a temporary directory and seeing if one is causing the problem.

  • I am trying to download an epub book from the library, which I have been doing for almost a year. Now I am being asked for my adobe id, which I enter and I get an error message stating Adobe Activation Request Error:2004.. What's this ?

    I am trying to download an epub book from the library, which I have been doing for almost a year. Now I am being asked for my adobe id, which I enter and I get an error message stating Adobe Activation Request Error:2004.. What's this ?

    I downloaded Blue Fire Reader and it requested an adobe id. I clicked on the link that was in the error message stated http//adeactivateadobe.com. Found out that if the date and time on my Ipad is wrong that it won't let me download a book. I was off 5 hours. I reset my clock settings and adobe id let me download a book from the library. I am back to using Overdrive and adobe again on my ipad.
    Thank you.

  • I have an apple id which I have been happily using to purchase from iTunes and it appears on iPad and iPhone. Now I have done something wrong in iCloud and my mobile me Id comes up on iPhone and iPad so I can no longer purchase. What should I do.

    I have an apple id which I have been happily using to purchase from iTunes and it appears magically on iPad and iPhone, MacBook and partner's iPod touch. Now I have done something wrong in iCloud and my mobile me Id comes up on iPhone and iPad so I can no longer purchase using this and i can't find a way to reset  What should I do? I want to be able to buy apps from iPhone and iPad from this same account and  still synch with my mac book and share with my partner's iPod touch.
    Any suggestions?

    We are users, not Apple. We cannot trace your phone, and neither can Apple.
    Please change every password you have. Posting your email addresses and Apple IDs on a public forum is insane. Hopefully a Mod will edit them out for you.

  • How to find out which documents have been indexed?

    Hi,
    How can we find out which documents have been indexed by intermedia - I get a lot of errors when i look in ctx_user_index_errors - but how can I relate or find which error row means which row or document in the table on which the index is created??
    Thanks
    Dhwanil Shah

    You can enable the log to see what's going. That will tell you the exact number of documets that failed.

  • The user or users have been added successfully, but there was an error in sending the e-mail message. The server may not be set up correctly to send e-mail. To verify that e-mail is configured correctly, contact your server administrator

    I got this problem when I tried to configure out-going email and add an account to farm administrator group.
    I configure out-going email according to this website http://technet.microsoft.com/en-us/library/cc288949.aspx
    Here are the screen shots.
    The SMTP server and email accounts work out OK when I use Outlook 2010 to test.
    Anyone can help me about it? Thanks.
    Here is the log.
    09/20/2012 09:21:00.36 w3wp.exe (0x1F7C)                      
    0x1138
    SharePoint Foundation         E-Mail                        
    8gsf
    High    
    #160008: The e-mail address 'admin3.sharepoint@domain' contains illegal
    characters. df98555c-612f-4a58-9443-ab6e9a4fcc53
    09/20/2012 09:21:00.36 w3wp.exe (0x1F7C)                      
    0x1138
    SharePoint Foundation         General                      
    8kh7 High    
    Cannot complete this action.  Please try again.
    df98555c-612f-4a58-9443-ab6e9a4fcc53
    09/20/2012 09:21:00.36 w3wp.exe (0x1F7C)                      
    0x1138
    SharePoint Foundation         E-Mail                        
    7946 Critical
    Cannot complete this action.  Please try again.
    df98555c-612f-4a58-9443-ab6e9a4fcc53
    09/20/2012 09:21:00.36 w3wp.exe (0x1F7C)                      
    0x1138
    SharePoint Foundation         Runtime                      
    tkau Unexpected
    Microsoft.SharePoint.SPException: The user or users have been added successfully, but there was an error in sending the e-mail message. The server may not be set up correctly to send e-mail. To verify that e-mail is configured correctly, contact your
    server administrator.    at Microsoft.SharePoint.ApplicationPages.AclInv.SendEmailInvitation(EntityEditor picker, String subject, String message)     at Microsoft.SharePoint.ApplicationPages.AclInv.BtnOK_Click(Object sender, EventArgs e)
        at System.Web.UI.WebControls.Button.OnClick(EventArgs e)     at System.Web.UI.WebControls.Button.RaisePostBackEvent(String eventArgument)     at System.Web.UI.Page.RaisePostBackEvent(IPostBackEventHandler sourceControl, String
    eventArgument)     at System.Web.UI.Page.ProcessRequestMain(Boolean includeStage...
    df98555c-612f-4a58-9443-ab6e9a4fcc53
    The e-mail address I have tested it for several times and there is no problem.
    Anyone has any clue about this error?

    Hi.
    This I have seen before...
    It can be that the SMTP relay server is configured to only allow certain IP ranges or addresses.
    It can be that the firewall on the SP server does not allow for SMTP traffic (normally 25, for example for Exchange).
    It can be that there is an Antivirus on the SP server(Client AV) that prohobits the Timer service to send email from this server. I have seen MacAfee do this. Needed an policy change.
    If, its the builtin SMTP service you are using, check this link:
    http://blog.sharepointrx.com/2010/11/18/setting-up-the-iis-smtp-server-for-sending-email-from-sharepoint-2010-on-server-2008-r2/
    Check that and try again.
    Regards
    Thomas Balkeståhl - Technical Specialist - SharePoint -
    http://blog.blksthl.com
    Download the SharePoint Branding Project here
    Download the SharePoint 2010 Site Settings Explained here

  • HT1212 i havnt changed my passcose and using the same passcode which i have been using since ages , its still not working, and i am 100 percent sure i am using the correct passcode ?

    i havnt changed my passcose and using the same passcode which i have been using since ages , its still not working, and i am 100 percent sure i am using the correct passcode ?.,

    Either way the result is the same... if you forgot (or don't know) your passcode, restore the device from backup on the last computer it was synced with when the passcode was turned on... this will remove the passcode. If you do not have access to the last computer it was synced with, you will have to force it into recovery mode & restore as a new device.

  • How can I see which pictures have been backed up

    How can I see which pictures have been backed up

    All the pictures in your camera roll will be backed up in iTunes or iCloud (depending on whether you have iCloud backup enabled on your iPhone) every time a backup is performed. The other photos stored on your iPhone (i.e. the ones you didn't shoot using the iPhone itself) will NOT be backed up.
    Nevertheless, it can't hurt to import them into iPhoto or Aperture (or whatever you're using) as roaminggnome suggested.

  • I was surprises to see my iphone is blanked which i have been using for few months

    i was surprises to see my iphone is blanked which i have been using for few months

    can someone help me in this pls???

  • Snote, how to check in which notes have been implemented

    hi guys,
    how can i check which notes have been implemented in a particular system ?

    Hi,
    Go to SNOTE -> Click on SAP Note Browser (Ctrl+F9)
    Here search all the notes in system
    Regards,
    Atish

Maybe you are looking for

  • How to set up a list view with easily-added and accessed attachments

    Hi, This may be a case for the Sharepoint designer forums or something similar but I wanted to start with General since I don't exactly know even what I'm asking for yet. Here's my goal - A web-based table of rows of columns similar to Excel where ev

  • Need to hide the field based on input to other field on screen

    Hi All, I enhanced the std. infotype 1029.Now I need to display one custom field only if another custom field (check box) is enabled, otherwise no. I tried writtinf code in PBO of ZP102900 in subscreen 0200.   loop at screen.   if screen-name = 'fld1

  • Report checking

    Hi abapers,                    I have written this code. my code is going fine. but still  i wanted to know what more changes i need to make in the code to make it more efficient and also i wanted to know where i have use  <clear> and <refresh> state

  • Publish a Dreamweaver designed Site to a Wordpress hosted Domain

    Hi everyone, I'm very new to this, and been relying on some amazing YouTube tutorials out there! I've come across a slight problem. I brought a domain name using Wordpress.com and have a rough blog there - very messy. I've since redesigend the entire

  • Replicating the LSMW

    Hi, We have different servers DEV and DEV1. i have written a LSMW in DEV. Now i want to replicate the same to DEV1. Can we do that?  if yes, how to do that Regards Shekhar