A New Archetype for Competitive Intelligence

By John J. McGonagle Jr.; Carolyn M. Vella | Go to book overview

10 Reverse Engineering

WHAT IS REVERSE ENGINEERING?

Reverse engineering involves acquiring (usually buying) and then dismantling a product to identify how it was designed and constructed. This process enables an investigator to estimate costs and evaluate the quality of the product. In the case of non-patentable processes and devices, it can also provide information on how to produce a competitive, compatible, or substitute product.

The reasons for becoming involved with reverse engineering vary widely. In one case, a computer chip company decided that its survival depended on developing a clone of a popular microprocessor. To do so, it assembled a team of twelve engineers willing to reinvent the chip. To start, the team (dubbed "the Cave Dwellers," from their office, "the Cave") "shaved" a competing chip, removing successive layers just a few atoms thick. As each layer was removed, the Cave Dwellers took photos of every square millimeter through a high-powered microscope. By studying mosaics of the photos, the engineers plotted the locations of all of the hundreds of thousands of transistors and traced the "gossamer web of connections" among all of them. The team recreated the circuitry on a computer-aided engineering system and produced a "clone." 1

The reverse engineering process is now applied to services as well as products. In the case of services, it is essentially deconstructing a service. Investment instruments or insurance products are examples of services and intangible goods that can be reverse engineered. In those cases, you determine what components go into providing the service, and then cost them out.

-85-

Notes for this page

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items
Notes
Cite this page

Cited page

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Note: primary sources have slightly different requirements for citation. Please see these guidelines for more information.

Cited page

Bookmark this page
A New Archetype for Competitive Intelligence
Table of contents

Table of contents

  • Title Page iii
  • Contents v
  • Figures and Tables vii
  • Acknowledgments ix
  • I - Introduction 1
  • 1 - About This Book 3
  • Note 4
  • 2 - Why Is Intelligence Important Today -- and More Important Tomorrow? 5
  • Appendix: National Interests in Intelligence 10
  • Notes 11
  • 3 - The Building Blocks of Cyber-IntelligenceTM 13
  • Appendix: Reengineering and Downsizing 19
  • Notes 20
  • 4 - Cyber-IntelligenceTM in the Modern Corporation 23
  • Appendix: Case Study -- How Pervasive is Cyber-Intelligence in Modern Businesses? 34
  • Notes 36
  • II - The Building Blocks of Cyber-intelligenceTM 37
  • 5 - Competitive Intelligence 39
  • How Does CI Relate to the Other Building Blocks of Cyber-IntelligenceTM? 44
  • Notes 49
  • 6 - Strategic Intelligence 51
  • Notes 54
  • 7 - Market Intelligence 57
  • Notes 60
  • 8 - Crisis Management 63
  • Notes 66
  • 9 - Benchmarking 69
  • Notes 82
  • 10 Reverse Engineering 85
  • Notes 90
  • 11 - Defensive (Counter) Intelligence 91
  • Notes 96
  • 12 - The Building Blocks of Cyber-IntelligenceTM: Charting the Relationships 97
  • III - Using Cyber-IntelligenceTM 99
  • Notes 105
  • 13 - Data Gathering: An Overview of Sources 107
  • Notes 117
  • 14 - Data Gathering: An Overview of Techniques 119
  • Appendix: Case Study 129
  • Notes 132
  • 15 - Data Analyses 133
  • Appendix A: Comparative Target Profile Summary 146
  • Appendix B: Strategic Analysis Report Form 147
  • Appendix C: Communicating Conclusions 150
  • APPENDIX B: STRATEGIC ANALYSIS REPORT FORM 151
  • 16 - Using Cyber-IntelligenceTM Intelligently 153
  • Appendix A: Using Cyber-Intelligence in Strategic Planning 174
  • Appendix B: Case Study -- CI Supporting Other Intelligence Functions 178
  • APPENDIX B: CASE STUDY -- CI SUPPORTING OTHER INTELLIGENCE FUNCTIONS 179
  • 17 - Critical Management Issues 183
  • Notes 190
  • 18 - The Future of Cyber-IntelligenceTM 191
  • A - U.S.-Based Organizations Involved with Some Aspect of Cyber-IntelligenceTM 193
  • B - Selected Internet World Wide Web Sites 195
  • Glossary 201
  • Select Bibliography 209
  • Index to Forms and Checklists 217
  • Index to Case Studies 219
  • Index 221
  • About the Authors *
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this book

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen
Items saved from this book
  • Bookmarks
  • Highlights & Notes
  • Citations
/ 225

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA 8, MLA 7, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Search by... Author
    Show... All Results Primary Sources Peer-reviewed

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.