ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.

Slides:



Advertisements
Similar presentations
Lesson 11 Team & Organization Building Text Book: Barringer B. and Ireland D. Entrepreneurship: Successfully Launching New Ventures 4 th edition, Pearson.
Advertisements

Chapter 13 Communicating the Opportunity. Objectives Target the business to investors. Prepare oral and visual presentation for investors. Investor evaluation.
Module 4 The Search for Capital. Module 4 Topics Sources of Capital Background Start-up Ongoing Operations Growth.
Entrepreneurship I Class #8 VOSG I Business Plan and Finances.
Joel Adams Ken Stuart Engineering Science 466b © J. Adams & K. Stuart : Starting up a Business March 16, 2004.
The Impact Angel Group Real Impact. Real Returns..
Vcapital Confidential1 Startup Workshop Presentation to.
Chapter 12 Managing the Team. Objectives Developing a strong corporate culture. Finding and hiring the best people. Dealing with firing an employee. Dealing.
Business Plan What is a Business Plan? Defn: “written document containing the guidelines for the business center’s (product/ group of products/
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
0 Presentation to the Colorado Bar Association Securities Subsection Hot Topics in Private Company Securities and Corporations Law* January 21, 2010 Jason.
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2005 ASTAV, inc. – Confidential & Proprietary – Patents Pending.
Venture Capital How to Sell Your Soul for a Buck.
Professional Venture Capital 1 ENTREPRENEURIAL FINANCE.
Chad Barden Financing Options for Entrepreneurs. Discussion Overview Available Options Venture Capital Private Equity (Angels) Grants Strategic Partners.
The Funding Process From The Entrepreneur’s Perspective Dan Dykens CEO Norbury Financial Systems, LLC.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Becoming a Professional Network Marketer Part I By Gediminas Grinevicius.
YABA and Hull Bondholders Accessing Finance 1 st November 2011 Susanne Gilbert YABA Ambassador North & East Yorkshire, North & North East Lincolnshire.
Top 10 Things Every Entrepreneur Needs To Know About Starting Their Own Company Michael Murphy President & Founder Conatus Consulting, LLC.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
How venture capitalists evaluate potential venture opportunities
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Website: Venture Presentations & Business Plan Development for Entrepreneurs SCI2 Business Incubator.
Enterpreneurship: Commercializing Technolgies Taking Research from the Lab to the Real World: Is Having a Good Idea Enough? Dorothy H. Air, PhD Associate.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
JUMPSTART NEW JERSEY ANGEL NETWORK Presentation at Pathway to Equity Financing Conference by Wayne Tamarelli, PhD Held by New Jersey.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
MGMT 3710 Entrepreneurial Foundations Chapter 9 The Business Plan.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Role of Investors in Entrepreneurial Ecosystem Lessons from Silicon Valley Naeem Zafar Faculty member, University of California, Berkeley.
Building the Best Team that Delivers and that Investors Love TEAMWORK MAKES THE DREAM WORK:
Presentation by Dr. Andreas O. Tobler October 19, 2010 Tento projekt je spolufinancován Evropským sociálním fondem a státním rozpočtem České republiky.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Introduction to Entrepreneurship: It’s All About The Money, Right? By: Venture Highway.
Patterns of Entrepreneurship
Funding For Recruitment Startups
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
IT Entrepreneurial Work Term
Day 5: Team Formation and Roles
PROFESSIONAL VENTURE CAPITAL
65 Questions Venture Capitalists Will Ask of Startups
…. the Angel Perspective
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
How to work a Job Fair.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
30 GOLDEN RULES FOR GETTING THE EARLY CUSTOMERS.
How to work a Job Fair.
Capital Advisory and Management Consulting
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Presentation transcript:

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. RESEARCH CONSULTING Entrepreneurial Computer Science Yonah Alexandre Bronstein, PhD alex_bronstein@ieee.org Session 9 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Session Outline APOLOGIES Administrative Stuff Homework Check… 5 yr Rev/Exp Projection? Chapter 6 Overflow: Art of Recruiting Chapter 7: Art of Raising Capital – Part 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Administrative Stuff Schedule: Mainsoft CEO “ a real Israeli start-up” on Dec 26th: Final Exam: “Virtual VC” training: 9 projects with 15 minutes to present their Investor Pitch (12’ hard stop) Virtual VCs (class students & industry experts) invest their virtual $ Sunday January 9th, 12noon – 15:00, Bldg. 37 Auditorium (#202) Final Files Submission: Monday Jan. 3rd, midnight. So we can print a booklet of all Executive Summaries So there is time for a final feedback from me before the show… ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Homework Check… 5 Year Revenue/Expense Projections, with a Business-person’s help… Students’ turn? $ is the  “idea” & “business” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

Ch.6: Reference Checking Goals: Consistency & Complete Picture boss/peer/report Good Questions: What contributions did Candidate make to the organization? What are Candidate’s specific skills? What is Candidate best/worst at? Would you hire/work-for Candidate again? Should I speak with anyone else about Candidate? Unsolicited References (cold calls into previous organizations; ask operator to connect to folks who…) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

Ch.6: CS Angle / Personal Experience “Managing Programmers = Herding Cats”, check: Programming languages/tool sets Work group experience vs. Lone Ranger style Ego… (High $$  High Ego  Low Cooperation Capabilities) Don’t mix business (conditional giving) with family (unconditional giving) Hiring is very hard to do Intellectually; find someone in your organization with a good & tested Gut Radar… ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.6: Final Wisdom Since recruiting is so difficult to do right, plan for failure! Set up an initial trial period (e.g. 90 days) upfront. Review performance – on both sides… Adjust if needed & possible, terminate otherwise. And: Don’t assume you’re ever done: recruiting – in both directions – must be done every day… (and that’s true in both business & family relationships…) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.7: Raising Capital Gist: Can raise $ from: Venture Capitalists (“VC”) Angels Foundations Government Entities F3 : Family, Friends, Fools Good pitch is necessary, but not sufficient: need to build something meaningful, long-lasting & valuable. ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.7: Get an “Intro” Intro = “This is so-and-so and I think you should…” “Cold call” ok to try, but at the risk of quick dismissal. (G.K. story: “a friend told a friend who told an associate who told a partner not to bother looking at a company.”) From whom? Anyone with credibility with investor: Current investors $ Professionals (lawyers, accountants) Other entrepreneurs Professors…  ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.7: Show “Traction” Traction = Tire grips the road and moves car forward. “Sales” really But not necessarily measured in $$: Enrollment (if membership model applies) Visitors (websites, museums, …) Field tests (action) Agreements to test or pilot (written words) References from potential customers (oral words) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

Ch.7: Personal Experience ASTAV raised funds (and motivated workers) for a couple of years based on one quote: “I spoke with Tim Sutton, our CEO, and he believes that the technology could be a benefit to Positive's service portfolio. I continue to think the idea sounds valuable, and we would likely add support as soon as it became available.” – Steve Dispensa, co-founder & CTO, Positive Networks ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.7: Investor Funnel Business Plans life in Investors’ hands: 2000 enter through all the doors (email, website, friends) 200 are moderately credible (from executive summary) 100 are interesting enough to read (the whole plan) 40 get thoroughly investigated (“due diligence”) 10 get funded (one or more times) 1 makes $$$ Game: avoid being eliminated! ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.7: Clean Up Your Act Intellectual Property (Who really owns the idea? Previous employer? Founder? Patent infringement?) Capital Structure (Too much stock in founders unwilling to share? Control by inflexible investor? Over/Under-priced previous rounds?) Management Team (Related co-founders? Unqualified friends in CxO positions? Criminal convictions?) Stock Offerings (Stock grants vs. options? High valuation sales to relatives? Solicitation of “unqualified” investors?) Regulatory Compliance (Nonpayment of payroll taxes, Noncompliance with country rules?) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

Ch.7: Disclose What Cannot Be Cleaned Up Earlier rather later, will help credibility. “Mea culpa” rather than blaming others. Previous failures are nothing to be ashamed of. “Getting up and trying again” shows that you are an entrepreneur. (Frog in the glass of milk fable…) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Q & A ? For Next Session? Take in feedback from midterm Sleep on it (pray if it seems too hard ) Act on it! (without waiting till end of semester…) Infinite Loops are OK here… ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.