How to Overcome Network Externalities in the IT Industry
This article analyzes why monopolies arise in the information economy, how network externalities shape IT industry competition, and proposes strategies such as market‑share expansion, standardization, user lock‑in, compatibility, and the "embrace‑extend‑extinguish" approach to break these externalities.
5. How to Overcome Network Externalities
In the knowledge‑based information economy, monopolies in the IT sector do not eliminate competition; instead, they intensify it across longer time spans, broader geographic scopes, and higher degrees of innovation.
Unlike traditional monopolies, firms in the information economy face fierce competition from many domestic and foreign rivals offering substitute products. Their monopoly positions are temporary and must be continuously defended through technological innovation and product upgrades.
Network externalities in the IT industry act as a "big monster"—they profoundly affect macro‑level economic models and micro‑level corporate operations, demanding new competitive strategies.
5.1 Mechanisms of IT Industry Monopoly Formation and New Competitive Features
5.1.1 Formation Mechanisms
1. Scale economies on both supply and demand sides leading to scale‑type monopoly.
When supply‑side and demand‑side economies of scale interact, firms may grow without bound, causing market concentration on a single product or technology and driving the market toward monopoly or oligopoly structures.
2. Property rights protection and standards competition leading to technology‑type monopoly.
In the information economy, controlling standards and patents becomes a key way to secure monopoly. Standardization forces the market to accept only a few technologies, making the holder of a dominant standard able to dictate market rules and reap large economic benefits.
3. Endogenous monopoly formed by strong learning effects and firm advantages.
Unlike traditional monopolies backed by administrative power, network‑based firms (e.g., Microsoft) achieve monopoly through self‑reinforcing growth, product superiority, efficient management, accumulated learning, and superior service, following a Darwinian survival model.
5.1.2 New Competitive Features in the IT Industry
Market share becomes the decisive factor for competition.
"Winner‑takes‑almost‑all" drives competitive intensity.
Standard competition is the primary competitive method.
User lock‑in is a crucial strategy.
Alliances and compatibility are key ways to gain advantage.
5.2 Competitive Behaviors and Strategy Choices
Traditional strategies such as collusion or price fixing often do not fit the IT industry; instead, strategies must align with the characteristics of the information economy.
5.2.1 Market‑Share Competition and Mainstreaming Strategy
The core of product mainstreaming is expanding market share until a critical mass is reached, after which network effects drive further growth without external assistance.
1. Accelerate market‑share expansion to reach the critical point early:
Launch the product first and act as a market navigator.
Selective openness to leverage network effects.
Establish consumer leaders to overcome inertia.
Increase technical content to lower the required user base.
2. Suppress or delay competitors from reaching the critical point.
5.2.2 User Base Stabilization and Lock‑In Strategies
Beyond expanding market share, maintaining a stable user base above the critical threshold is essential for lasting mainstream status; lock‑in mechanisms help preserve this base.
5.2.3 Standardization and Standard‑Competition Strategies
Winning standards means winning the market: "Three‑star firms sell labor, two‑star sell products, one‑star sell patents, top‑star sell standards."
Key assets for standard competition include control of user installation bases, IP, innovation capability, production capacity, complementary products, and brand reputation.
Effective standard‑competition strategies involve setting appropriate goals, choosing the right timing, cultivating internal resources, and organizing efficiently.
5.2.4 Product Differentiation and Compatibility Strategies
Product differentiation offers diverse choices but can hinder network effects; compatibility expands network scale but reduces differentiation. Firms must balance these based on consumer preferences.
Compatibility can be achieved through standardization or adapters; standardization is generally preferred despite higher coordination costs.
5.3 Embrace, Extend, and Extinguish
The "Embrace, Extend, and Extinguish" (EEE) strategy, identified in Microsoft’s practices, involves adopting widely used standards, adding proprietary extensions, and using those extensions to disadvantage competitors.
Historical examples include the evolution from Mosaic and Netscape to Internet Explorer, the rise of Chrome as an open‑source, strategically positioned browser, and Google’s role in web standardization through W3C.
Open‑source initiatives (e.g., Mozilla, Chromium) illustrate how openness can foster community contributions and market adoption, while strategic openness can also reinforce a firm’s dominant position.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Huawei Cloud Developer Alliance
The Huawei Cloud Developer Alliance creates a tech sharing platform for developers and partners, gathering Huawei Cloud product knowledge, event updates, expert talks, and more. Together we continuously innovate to build the cloud foundation of an intelligent world.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
