ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.

Slides:



Advertisements
Similar presentations
BC Thaker - 25 th January, “IT IS THE EXECUTION, DUH !”
Advertisements

Business plans MGT 470. Feasibility Study versus Business Plan Feasibility = screening opportunities to decide the conditions under which you are willing.
Profit Maximization Profits The objectives of the firm Fixed and variable factors Profit maximization in the short and in the long run Returns to scale.
CSC230 Software Design (Engineering)
CHAPTER 5 SUPPLY By Mr. Pillsbury 10 vocabulary words.
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
The Art Of Starting Submitted by G.Tapasvita G.Tapasvita 60,MBA,AGBS 60,MBA,AGBS.
Steve Paulone Facilitator Financial Management Decisions The financial manager is concerned with three primary categories of financial decisions:  1.Capital.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Computer –the machine the program runs on –often split between clients & servers Human-Computer Interaction (HCI) Human –the end-user of a program –the.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
How do new products come to market???. For the teacher This lesson plan is designed to help high school students learn about how ideas become products.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Miami Lakes K-8 Center Mrs. DiDonna 5 th Grade Math.
Product Management. Facts about Product Management Many managers realized that investment in INNOVATION is critical for future growth & even in the survival.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Product Management Or.. The most important thing most startups forget to do.
THE ART OF STARTING BY SACHIN UPPAL ROLL NO
What’s Coming  Today  Group market research presentations (45’)  Work Session with advisors- market research refinement (30’)  Commercialization options.
ENTREPRENEURSHIP DEVELOPMENT V.S.G.Soujanya MBA#8036.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Knowledge of the Marketplace
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
New Product Innovation
Introduction to High Availability
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Your Product/Service.
Information Systems Sarika Agarwal.
User-centred system design process
Business Plan CHAPTER TEN.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
COMP 523 Diane pozefsky 24 August 2016.
Management of Technology
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Design Thinking About Viability
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Name Project / Organization
Extreme Programming.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Waterfall and Agile Quality Techniques
Operating Systems and Systems Programming
What do you need to know about XP?
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
The World of Business & Accounting
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Rethinking Cost and Performance of Database Systems
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
2/18/2019 E-commerce Project Minpeng Zhu.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Concepts of Engineering and Technology
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
2/25/2019 E-commerce Project Minpeng Zhu.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Chapter 2 – part a Brent M. Dingle Texas A&M University
Chapter 2 Applications Software and Operating Systems
Presentation transcript:

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. RESEARCH CONSULTING Entrepreneurial Computer Science Yonah Alexandre Bronstein, PhD alex_bronstein@ieee.org Session 2 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Session Outline Administrative Stuff Chapter 1: Personal Experience Chapter 1: Other Fundamentals Homework Check & Refinement ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Administrative Stuff Office Hour: Location: Building 58 (Math), Room –105 (basement) Time: Sunday 2pm – 3pm (i.e. right after class) Textbooks: G. Kawasaki "The Art of the Start” (Amazon: $11 - $18) D. Packard, "The HP Way” (Amazon: $1 - $12) Suggestion? D. Senor & S. Singer: “Start-up Nation: the Story of Israel’s Economic Miracle” (Amazon: $15 – $18, Staimetzky’s?) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Administrative Stuff Overflow students… Univ. decision: nope. “Auditing?” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

Ch.1: Personal Experience What do you think is the Meaning/Mantra in: GAIN DDS VERITAS BEZEQ? EL AL? Better Place? ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1 M&M: GAIN? Poor Multimedia support in Relational Databases (back in early 90’s): Input (capture) Storage (efficiency) Output (usability) “Database: the Next Generation” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1 M&M: DDS Next generation/sophisticated Document handling? Single user (desktop) Office environment (“super” copy machine) Xerox PARC full of ideas, Xerox tired of seeding other start-ups: “internal” start-up “PARC invents & Xerox profits!” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1 M&M: VERITAS Really Reliable Storage, for those who couldn’t afford Monster RAID Arrays… “Soft Hardened Storage” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1 M&M:BetterPlace Electric Cars + infrastructure of battery-swap stations… Shai Agassi + Palo Alto,CA + Ramat HaSharon,Israel 5 years & www.BetterPlace.com ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1: Get Going BUILD (something) SELL IT (to someone, for $$ or just words) Gives you a Reality Check: Market Technical capability Team’s ability to work together (So you can fail, fail, fail, and then converge on something that works!) ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1: Business Model Physics: energy flow to keep the machine running KISS: Keep It Simple Silly! Do not invent Ask (only) women for feedback To many investors, that’s the most important slide: “Tell me again, how do you make money?” ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1: M.A.T. Milestones: Prove concept Complete design spec Finish prototype Raise capital Ship testable version to customer Ship final version to customer Achieve break-even Assumptions: list them to find flaws early Tasks: day-to-day entropy management ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Ch.1: CS Angle? CS should NOT be the top priority thinking yet (unless problem is in the CS space) Prototype / Architecture considerations: Want prototype as quickly as possible, But it will live on much longer than you ever think… Architecture should be maximally SCALABLE (in size & function) Prototype should be minimally SELLABLE as a pilot/trial Proprietary / Open Source? (“What’s your barrier to entry?” 2nd most favorite investor question) Patents? 1 fantastic programmer is better than 6 average ones ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.

ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. Homework… Read Chapter 2 and APPLY Chapter 1 to “The Project”: Meaning/Mantra Team (with student Id and email address) (Extra Credit): Tag Line? Milestones? “Eat your own dog food!” (D. Cutler) ASTAV v.2: Protect People from Abuse & Fraud!SM ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact Research@ASTAV.net for pricing.