Ever felt like business competition is a chaotic chessboard? 🚀
Unlock game-changing tactics with "Winning the Right Game" by Ron Adner – your blueprint for outsmarting rivals, shielding your empire, and conquering shifts! 📖
Brilliantly translated by Huang Tingmin from Global Views Monthly, it reimagines ecosystems to fuel innovation. 💡

🔗 https://www.roastdev.com/post/....mastering-disruption

#businessecosystems #disruptionmastery #strategicinnovation #valuerevolution #futureproofbiz

Favicon 
www.roastdev.com

Mastering Disruption: Key Lessons from Ecosystem Strategies in Modern Business

Discovering Fresh Approaches to Business Rivalry Hey, imagine you're chatting with a buddy over coffee, and I tell you about this fascinating read that flips traditional business thinking on its head. It's called "Winning the Right Game: How to Disrupt, Defend, and Deliver in a Changing World" by Ron Adner. The original mind behind it is Ron Adner himself, with Huang Tingmin handling the translation, and it's put out by Global Views Monthly.â›ļtitle: [Book Sharing] Ecosystem Competition Strategy - Redefining Value Structure, Identifying the Right Game in Transformation, Mastering Strategic Tools, and Winning the Initiative (Book Excerpt)
published: false
date: 2022-12-30 00:00:00 UTC
tags:
canonical_url: http://www.evanlin.com/reading-Winning-the-Right-Game/
---

[![](https://cdn.readmoo.com/cover/bf/a5ghkfg_210x315.jpg?v=0)](https://moo.im/a/exCKOZ "Ecosystem Competition Strategy")

Let me share why this book hits hard: in times of massive shifts across sectors, stumbling in the outdated arena can knock you out quicker than any direct showdown. Jim Collins, the brains behind "Built to Last," calls Adner one of the top strategic minds this century has seen. And it's fresh from the folks at "MIT Sloan Management Review"—definitely a heavy hitter.Take the story of Kodak back in 2012—they filed for bankruptcy, going from a powerhouse in global photography to a textbook example of botched evolution in the digital age. But hold on, was it really just about ignoring digital tech? Nope, the real killer was overlooking how the entire network of players and processes got totally upended!These days, every organization grapples with crumbling old structures and the need to rebuild interconnected systems. That's the core battleground.As boundaries between fields blur, making it tough to spot who's on your team versus who's lurking as a future foe, figuring out the smart way to engage becomes crucial.Ron Adner teaches strategy at Dartmouth's Tuck School of Business—that elite Ivy League spot—and he's dived deep into areas like company breakthroughs. With a stack of awards under his belt, he's known globally as a guru on navigating business networks. In his latest book, he unpacks how these modern setups for generating worth stand apart from old-school models. He moves beyond just looking at supply lines, resource pools, or internal strengths, and instead lays out fresh mindsets vital for thriving amid networked rivalries.â›ļ
#### Book Purchase Recommendation Website:

- [Readmoo Online Book Purchase](https://moo.im/a/exCKOZ)

# Preface:

This is the twenty-fourth book I've read this year. I originally received a physical copy of this book. However, because I was traveling abroad, I couldn't get the physical book to read. I'm also someone who likes to read e-books, so I bought the e-book version. And most of the chapters were read through the e-book's narration, which was really an interesting book.

I would also like to explain in advance that this book has a very large vision. It clearly explains the process of ecosystem transformation, the establishment of ecosystems, and even how to defend and win. However, readers who are practitioners may not completely agree with some of the methodologies inside. But the examples given inside really supplemented me with a lot of things I didn't understand.

# Thoughts

This book breaks down the entire ecosystem competition strategy as if it were a textbook, clearly explaining the composition of the ecosystem, the elements that make up the ecosystem, and the ways in which the ecosystem grows, as well as how to win in the ecosystem. There are many examples given inside, which have given me a new understanding of many things:

- [Kodak](https://zh.wikipedia.org/zh-tw/%E4%BC%8A%E5%A3%AB%E6%9B%BC%E6%9F%AF%E8%BE%BE%E5%85%AC%E5%8F%B8)'s wrong market strategy.
- [Lexmark](https://en.wikipedia.org/wiki/Lexmark)'s proactive transformation strategy.
- Spotify, TomTom, and Wayfair related strategies.

The above two are related to changes in the ecosystem, but what should you do when a strong competitor comes along? The author also provides relevant cases to share. In the second half, the author promotes Microsoft's Nadella as an example and a case of transformation. Because Nadella organized an external ecosystem and integrated resources internally. (This is also the most difficult.)

Many times, many organizations advocate "passion," but passion is not a guiding principle. Trust and understanding the company's strategy is a sentence that everyone follows, and it is also a way to combine changes and transformations within the internal ecosystem.

(Thoughts to be continued)

# Introduction:

Oh, and here's a quirky fact from the BBC: Among the priciest fluids worldwide in 2018, black printer ink came in eighth place—trailing behind stuff like scorpion toxin, insulin, and even Chanel No. 5 perfume.â›ļ
## Chapter 1: Losing the Wrong Game is Equivalent to Failure

Companies are constantly driving new industry transformations due to the invention of new products. But Kodak, which invented the digital camera patent in 1975, later went bankrupt. In the news, we often assume that they were eliminated by digital cameras because the company was old and didn't follow the transformation. But the real story is often not like that. Kodak's failure was not in missing the opportunity, but because they lost the wrong game.

Kodak started building the digital imaging field in 1980, and by acquiring ofoto.com (an online photo album website), they made their "digital printing" field even bigger. In 2005, Kodak still had the first-place sales of digital cameras in the United States. They also knew that film was already a sunset market, and they also started to see printing consumables, and built their own ecosystem through the printing of digital photos.

Similar Posts

Similar

Ever wondered how invisible foes like viruses have secretly sculpted human history? 🌍 From ancient empires crumbling to modern globals flipping, books like 'Plagues and Peoples' reveal it all.
🚀 In our hyper-linked world, threats like COVID-19, SARS, Ebola, and malaria force epic comebacks – turning chaos into innovation! Dive in to conquer the fear. đŸ’Ē

🔗 https://www.roastdev.com/post/....exploring-disease-s-

#diseasehistoryunveiled #microbemasters #pandemicpowershifts #globalhealthsaga #epidemicevolution

Favicon 
www.roastdev.com

Exploring Disease's Role in Shaping Societies: A Dive into 'Plagues and Peoples'

Why Diseases Have Always Been Humanity's Shadow Hey there, imagine this: we've sent rockets to other planets, but tiny microbes still keep us on our toes. As the world gets more connected, bugs hitch rides across borders easier than ever, stirring up worries in every corner. Time and again, we've seen how outbreaks can flip economies and politics upside down, pushing us to adapt in tough ways. Think about recent foes like COVID-19, SARS, Ebola, or even the flu strains – getting a grip on their stories is key to shaking off the anxiety they bring. Take something like malaria – it turned sacred journeys into hotbeds for outbreaks, spreading misery far and wide. Then there's cholera, which loves jumping on modern travel networks to claim new territories without a second thought. And don't get me started on bird flu; it's putting the squeeze on those massive farms where animals are packed tight, forcing a rethink on how we raise our food. Way back, our tree-dwelling primate relatives dealt with constant irritations from parasites like fleas and lice. When early humans dropped to the savannas, they battled sleeping sickness amid the endless grasses. Once folks settled into farming life, things like schistosomiasis sapped their strength in those early villages. Trade routes between continents let smallpox sneak in with merchants, quietly setting up shop in untouched lands. The mighty Mongol forces, charging across vast areas, unwittingly carried the plague through Europe and Asia. Colonizers from the West used accidental disease spread, especially smallpox, to tip the scales in their favor during expansions. Fast-forward to the machine age, and all that speedy transport turned our planet into one big stew of potential infections.â›ļtitle: [Book Sharing] Plagues and Peoples - The Impact of Infectious Diseases on Human History
published: false
date: 2022-12-16 00:00:00 UTC
tags:
canonical_url: http://www.evanlin.com/reading-Plagues-and-Peoples/
---

[![](https://cdn.readmoo.com/cover/bg/d7bfk8c_210x315.jpg?v=0)](https://moo.im/a/24ipqZ "Plagues and Peoples")

Plagues and Peoples The Impact of Infectious Diseases on Human History å…ą 66 äēēčŠ•åˆ† (66 ratings) Author: William H. McNeill Translator: Yang Yuling Publisher: Commonwealth Publishing â›ļ
#### Book Purchase Recommendation:

- [Readmoo Online Book Purchase](https://moo.im/a/24ipqZ)

# Preface:

This is the twenty-third book I've finished reading this year. I bought this book along with a book about vaccines, but it's actually a book from 1975. It has compiled a lot of information about the impact of plagues and epidemics on human culture after years of research.

# Content Summary:
Similar

🚀 Ready to unlock the future of logins? Passkeys are your ticket to a password-free life, using biometrics or devices for seamless access!
But wait—why kick off with an email or username (and yep, sometimes an old-school password)?
It's the secure foundation: linking your identity first ensures everything syncs safely. Dive in and level up your digital security! 🔑💡

🔗 https://www.roastdev.com/post/....demystifying-passkey

#passkeyrevolution #secureloginsecrets #ditchpasswordsnow #biometricaccess #techsecurityboost

Favicon 
www.roastdev.com

Demystifying Passkey Setup: The Lingering Need for Usernames and Passwords at the Start

Getting Started with Passkeys in the Digital World Hey there, if you've been diving into modern web tech, you might've come across passkeys—they're like the cool new way to ditch those pesky passwords for good. But here's a head-scratcher that pops up a lot: even with all this fancy passwordless magic, why do you still have to set up an account with a username or email, and sometimes even a traditional password, right at the beginning? Let's break it down step by step, like we're chatting over coffee. The Basics of What Passkeys Actually Do Imagine passkeys as your personal digital keychain, powered by tech like WebAuthn standards. They're designed to let you log in using biometrics, like your fingerprint or face scan, or even hardware tokens, without ever typing out a password. The goal? Make things safer and smoother by cutting out weak links like easily guessed passwords. But the setup phase? That's where things get interesting, and it's not as contradictory as it seems. Why the Initial Account and Password Step Isn't Going Away Think about it this way: when you're creating a fresh account on a site or app, the system needs a reliable way to identify you from the get-go. That's where your email or username comes in—it's like your unique address in the online universe. Without it, how would the service know who you are or send you recovery info if something goes wrong? Now, tossing in a password during this creation might feel outdated, but it's often there as a safety net. Not every device supports passkeys yet, and some folks might need a fallback for older browsers or when they're on a shared computer. Identity Verification: Services use your email to confirm you're real and to handle things like two-factor checks. Recovery Options: If you lose access to your passkey device, that initial password can be a lifesaver for getting back in. Backward Compatibility: Not all platforms are fully passkey-ready, so blending old and new methods ensures everyone can join in. How This Plays Out in Real Scenarios Picture signing up for a new banking app. You pick an email, set a temporary password, and then the app prompts you to create a passkey. That first password might stick around for emergencies, but once your passkey is active, you can wave goodbye to typing it in daily. It's all about building a secure foundation before going fully hands-off. For more on the tech behind this, check out the WebAuthn Guide—it's a solid resource for geeking out on the details. And if you're curious about implementing this yourself, here's a quick code snippet to illustrate a basic passkey flow:â›ļtitle: [TIL] Why the Passkeys process still requires an account and password when creating an account?
published: false
date: 2022-12-09 00:00:00 UTC
tags:
canonical_url: http://www.evanlin.com/til-why-passkeys-need-idpw/
---

![image-20220608151748839](http://www.evanlin.com/images/2021/image-20220608151748839.png)

# Background:

I wrote an article about [Passkeys after WWDC](https://www.evanlin.com/til-apple-passkeys/). As a result, I saw an interesting tweet a few days ago, which made me re-examine how familiar I am? What are the differences in the actual Passkeys process (first time and subsequent times)? This article will summarize this part.

# (Updated 2022/12/10) If it's the first time creating an account, how many steps are required? Why?

![image-20221212081920686](http://www.evanlin.com/images/2022/image-20221212081920686.png)

The tweet I saw before mentioned why [Yubico/java-webauthn-server has nearly 21 steps](https://github.com/Yubico/java-webauthn-server#architecture)? This also made me curious to check the original meaning of the related process:

![WebAuthn ceremony sequence diagram](http://www.evanlin.com/images/2022/demo-sequence-diagram.svg)

(Pic from [https://github.com/Yubico/java-webauthn-server#architecture](https://github.com/Yubico/java-webauthn-server#architecture))

According to the diagram of this component, everyone will be very curious. Here, you need to combine it with another diagram to see:

![](https://www.evanlin.com/images/2021/image-20220615175557038.png)

- **Step: 1 ~ 4:**
- When creating an account, because it needs to support older browsing devices (browsers/OS), you still need an account and password here. The entire process is the same as the previous database, but the following process is a bit different.
- If there is a User-Agent that supports Passkeys and doesn't need Backward Compatibility, you actually don't need 1 ~ 4 (but you should have them).
- **Step: 5:**
- This is based on the [PKCE method](https://www.evanlin.com/go-oauth-pkce/) to generate a Challenge, which is a value that has been AES encrypted.
- **Step 6 ~ 9:**
- At this time, you can generate a credential ID (optional) and return it to the client side as the value generated by the client agent.
- User-Agent may pass Challenge + credential command + credential ID
- **Step 9 ~ 18:**
- This is where the Client Agent will be activated to open the Passkeys support login process.
- The encrypted credential is transmitted to the server side through private encryption.
- After decrypting with the Public key that was accessed before, confirm whether it is the same credential ID.
- **Step 18 ~ 21:**
- Registration is completed after Auth is completed.

### Several key points are:

- The related process is definitely more cumbersome than the original ID/PW (may be more selective of devices).
- But after the first registration is completed, if the device allows it, you don't need to enter ID / PW afterwards.
- The demo example also uses Passkeys from the first time, but this often cannot be used universally for older devices.

# Passkeys Login Experience

![img](http://www.evanlin.com/images/2022/626bb73342428b103f9762fc_Frame2_4.svg)

![img](http://www.evanlin.com/images/2022/626b91ad953301480820e9d3_Frame2_2.svg)

# Support for related devices

![image-20221212092215898](http://www.evanlin.com/images/2022/image-20221212092215898.png)

(From: [https://www.passkeys.io/](https://www.passkeys.io/))

Here you can see that the WebAuthn called inside Passkeys is actually related to the App and OS version of the browser. So if you want to fully implement the Passkeys system as soon as possible, it is actually the browser support. If it is natively supported by a system similar to Apple, it can also be implemented in the development of the App as soon as possible.

# Finally

![image-20221212085622584](http://www.evanlin.com/images/2022/image-20221212085622584.png)

(From: [WWDC22 Session: Meet passkeys](https://developer.apple.com/videos/play/wwdc2022/10092/) )

As in the end of this video, Passkeys is not about saving the entire login process. Instead, it is about enhancing the security and user convenience of the entire login process. In order to achieve the true Password-less realm, it actually requires the cooperation of many industries:

- The server side needs to use WebAythn to write its own login application.
- And keep the versions of the related servers up to date
- Also remind users to use the latest version of the phone (seems simpler).

# Reference

- [Apple Doc: Supporting Passkeys](https://developer.apple.com/documentation/authenticationservices/public-private_key_authentication/supporting_passkeys)
- [WWDC22 Session: Meet passkeys](https://developer.apple.com/videos/play/wwdc2022/10092/)
- [WWDC21 Session: Move beyond passwords](https://developer.apple.com/videos/play/wwdc2021/10106/)
- [FIDO2: Web Authentication (WebAuthn)](https://fidoalliance.org/fido2-2/fido2-web-authentication-webauthn/)
- [Passkeys for web authentication](https://www.hanko.io/blog/passkeys-part-1)
- [What Apple’s WWDC Passkeys Announcement Means for Enterprise IAM](https://blog.hypr.com/what-apples-wwdc-passkeys-announcement-means-for-enterprise-iam)
- [https://github.com/duo-labs/webauthn](https://github.com/duo-labs/webauthn)
- [WebAuthn.io: A demo of the WebAuthn specification](https://webauthn.io/)
- [What is WebAuthn? How to Authenticate Users Without a Password](https://www.freecodecamp.org/news/intro-to-webauthn/)
Looking Ahead: The Evolution of Secure Logins As more devices and browsers catch up, we might see setups that skip passwords entirely, relying solely on passkeys from the jump. But for now, this hybrid approach keeps things practical and secure. It's like training wheels on a bike—you need them at first to build confidence before zooming off freely. Got questions or want to share your experiences with passkeys? Drop a comment below!
Similar

A Wild Tale of Losing My Innocence

So, check this out—my ride-or-die buddy invited me to this epic rager at his parents’ MASSIVE crib. Shit was popping off, everyone was buzzed out of their minds, and I stumbled outside to take a breather in the bushes. Low and behold, there’s this chick just chilling in the shrubs, and she straight-up offers to blow me. I’m like, hell yeah, let’s go! But then, plot twist—she turns around and bends over. Yeah, you know what went down next. That’s the raw, unfiltered story of how I got my cherry popped!

#wildnight #firsttime #partyhard #nofilter