Open source ... hardware? Someday, say ETech attendees
Distributed development and print-your-own gadgets on the way
Computerworld - If sci-fi author William Gibson’s claim that "the future is here, it’s just not evenly distributed yet" is correct, then how we will manufacture physical goods tomorrow may be augured by how we make software today.
Open-source, object-oriented development, personalization, even hacking, are presaging and inspiring new manufacturing methods that will overhaul today’s plodding techniques born during the Industrial Revolution, according to panelists speaking Monday at the O’Reilly Emerging Technology Conference in San Diego.
"We’re seeing hardware become more like software, and rapid development become a competitive advantage," according to John Hagel, a business consultant and author.
Take the Chicago-based clothing maker skinnyCorp. The 7-year-old collective started a Web site called Threadless.com through which they solicit T-shirt designs from the public. Visitors to the site can vote on their favorite designs. The most popular ones are made into T-shirts and sold by Threadless.com, while their creators get $2,000 in cash.
This open-source style of product development allows Threadless to get by without hiring any professional designers, said Jeffrey Kalmikoff, the company's chief creative officer.
"We just ask people what they want and then we give it to them," Kalmikoff said. "It’s not an exact science. But we’ve never not had a T-shirt sell out."
More than 40,000 designs have been submitted. So far, 750 designs have been made into T-shirts. Through pure word of mouth -- the company only puts its logo on the tag -- Threadless.com now sells more than 80,000 t-shirts a month. At an average of $15 per shirt, that adds up to a $13 million per year business with 30 employees.
Kalmikoff said a conventional clothing maker trying this open-source product development on a limited basis would probably fail. "A big company is a like a skyscraper. If you tried to change the foundation, the building would probably fall down," he said.
Speeding up motorcycle development
In the Chinese metropolis of Chongqing, according to Hagel, open-source techniques have helped a booming motorcycle industry develop from scratch in just the last decade and a half, "taking dramatic share from the Japanese [manufacturers] throughout Asia."
The companies have profited by modularizing the development process so that they can outsource as many individual parts of the motorcycle as possible to outside suppliers, many of them small firms focused on only a few parts or even just one. That contrasts sharply with the traditional supply chain model of Japanese and Western businesses, which try to keep the number of suppliers small to reduce management costs, Hagel said.
For the Chinese companies, they have been able to cut the average price of a motorcycle in the last five years by 70%, to $200, without compromising quality, Hagel said. At the same time, they are able to innovate very quickly -- a key advantage in China, where copycats are common because of relatively weak intellectual property laws -- despite lacking Internet access and doing most of their meetings face-to-face in teahouses, he said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts