בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008-2013 ASTAV, inc. – Confidential & Proprietary – Contact

Slides:



Advertisements
Similar presentations
MECH/AREC 581A2 Sustainable Technology Entrepreneurship for Scientists and Engineers The Business Plan March 2, 2011 Rick Turley.
Advertisements

SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
VENTURE CAPITAL INVESTMENT COMPETITION VCIC W ELCOME ! ________ R EGIONAL F INALS Organizer: update for your region. Created by Organizer School Logo Here.
Vision and Mission Statements Guiding principles by which a company functions.
Business Plan Preparation Frank Moyes Leeds College of Business University of Colorado Boulder, Colorado 1 Financial Plans.
Business Plan Preparation Frank Moyes Leeds College of Business University of Colorado Boulder, Colorado 1 Financial Plans.
Knoxville Business Laboratory Business Services & Solutions.
For Investors How it works Investing in private emerging growth companies You are an accredited investor and looking for ways to increase your return.
A Starter Business Plan By: Joshua M. Warne English 102 Section July 19, 2008.
EUREKA HTIP Investment Readiness webinar #3 « Communicating with investors (post investment)» Presented By Selma Prodanovic | Serial Entrepreneur and Investor,
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
The Business Plan: Visualizing the Dream PowerPoint Presentation by Charlie Cook The University of West Alabama Copyright © 2006 Thomson Business & Professional.
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2005 ASTAV, inc. – Confidential & Proprietary – Patents Pending.
Guy Kawasaki By Nagarjuna.R Enroll No: Make Meaning 2. Make Mantra 3. Get going 4. Define your business model 5. Weave a MAT.
The Business Plan A business plan is a document that sets out the basic idea underlying a business and describes related startup considerations. It should:
Today Wed Class schedule update & Presentation Forums (5’)
Preparing and Planning to Manage
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
By ARDHENDU SAHA MBA-2010 REG NO-8011 AMITY GLOBAL BUSINESS SCHOOL.
Opportunity Recognition
Copyright © 2012 Pearson Canada Inc Administrative Items Reminder: Co-Op Application Deadline Tuesday, Jan 13 th Reminder: In-class Quiz Wednesday.
Hello World! CSE442. Course Summary A semester long group project – You will develop software from idea to implementation You have full freedom to choose.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Program Structure 12 Week Program 10 Participating Teams Mix of Corporate & Startup Teams 12 Week Program 10 Participating Teams Mix of Corporate & Startup.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
CS 197 Computers in Society Professor John Peterson.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
MGMT 3710 Entrepreneurial Foundations Chapter 9 The Business Plan.
Applied Software Project Management
Opportunity Recognition Identify a problem or need –What would you like to see better –What annoys you –What needs fixing –What can be done better Find.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
You Don’t Get $1M in Funding with a Half-Baked Business Plan!
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
CS 345 – Software Engineering Nancy Harris ISAT/CS 217
Infrastructure and Security Marcus J. Ranum Network Flight Recorder, Inc.
Michigan Business Brokers Association The Venture Capital Process December 8, 2015 Presented by TGap Ventures General Partner: Jack Ahrens.
Chapter One Why Plan? Copyright © 2009 Pearson Education, Inc. publishing as Prentice Hall 1-1 Dr. Bruce Barringer University of Central Florida.
Instructor: Mike Kujawski Course Wiki: “ Password: “entrepreneur” Contact me at: if you have any.
Role of Investors in Entrepreneurial Ecosystem Lessons from Silicon Valley Naeem Zafar Faculty member, University of California, Berkeley.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
MGT 300 Entire Course FOR MORE CLASSES VISIT MGT 300 Final Examination MGT 300 Week 1 Individual Assignment Entrepreneurial Strategy.
Initials, Inc. Joyce Davis 12/8/14 PASSION TO REALITY.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Taylors University’s 11 Slide Pitch Desk
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Day 3 Morning 1. Attendance/Recap/Questions
Taylors University’s 11 Slide Pitch Desk
Presentation transcript:

בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. RESEARCH CONSULTING Entrepreneurial Computer Science Yonah Alexandre Bronstein, PhD Session 1

בסד Safety Bolts for Web Doors.™ 2 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Session Outline 1.Meta Stuff (about the class) 2.Overall Flow of a Start-Up (per G. Kawasaki) 3.Chapter 1: Art of Starting (diving in) 4.“The Project”…(rules & brainstorm)

בסד Safety Bolts for Web Doors.™ 3 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Meta Stuff: Class Goal? Increase your effectiveness at building a function: ƒ ƒ:CS  C$ And avoiding the more common function: ƒ 0 :CS  0$ Therefore I’m here as a Consultant for your Start-Up…

בסד Safety Bolts for Web Doors.™ 4 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Meta Stuff: Class Deal I bring: 10 years bringing ASTAV from Birth to paying users of our Identity Fraud Protection technology 6 years in 3 other Silicon Valley start-ups BS in Math, MS and PhD in CompSci, from Stanford University 1 st Windows NT port to DEC 1 st Windows NT port to DEC25 years in Silicon Valley (incl. 1 st Windows NT port to DEC…)1 st Windows NT port to DEC You bring: Technological Freshness (from #1 technical place in the world…) Dreams Enthusiasm/ENERGY!

בסד Safety Bolts for Web Doors.™ 5 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Meta Stuff: Readings Main course textbook: Guy Kawasaki, "The Art of the Start: The Time-Tested, Battle-Hardened Guide for Anyone Starting Anything", Portfolio, Available at: Starting/dp/ Optional counterpoint: David Packard, "The HP Way: How Bill Hewlett and I Built Our Company", any edition. Available at: Essentials/dp/ s

בסד Safety Bolts for Web Doors.™ 6 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Meta Stuff: Homework Homework: each chapter in “The Art of the Start” is expected to have been read before the corresponding session (the more you know of the basics, the more I can go into details…) “The Project” will be a (toy) start-up, with Kawasaki’s recommended PowerPoint & Doc, and which will remain owned by the student, to pursue as they wish… (MID-TERM grade given to get everyone started early, and expectations set right…)

בסד Safety Bolts for Web Doors.™ 7 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Meta Stuff: Grading 20% class participation (I need to stay awake too…) 80% project: –PowerPoint Pitch (and how much $$ it raises at the Virtual VC Final…) –Executive Summary Doc –Real-World Interactions/Progress –Overall Effort (what you put in is what you get out) …if your “toy start-up” gets FUNDED  100/100 (note: OPM $$ required…)

בסד Safety Bolts for Web Doors.™ 8 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Overall Flow: Why? “The End is Wedged in the Beginning” An architect has a Vision of the final Form & Function of a building before they start drawing the Blueprint/Plan... Therefore Overall View of the Startup Lifecycle tells you: “Where are we going?” “Where are we now?”

בסד Safety Bolts for Web Doors.™ 9 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Overall Flow: Lifecycle 1.CAUSATION (seed / theorem) Chapter 1: Art of Starting 2.ARTICULATION (planting / writing the formula) Chapter 2, 3 & 4: Art of Positioning, Pitching, Writing a Business Plan 3.ACTIVATION (watering seedling / base case: n = 1) Chapter 5, 6 & 7: Art of Bootstrapping, Recruiting, Raising Capital 4.PROLIFERATION (grow tree / recurse: n  n+1) Chapter 8, 9 & 10: Art of Partnering, Branding, Rain Making 5.OBLIGATION (share the harvest) Chapter 11: Art of being a Mensch

בסד Safety Bolts for Web Doors.™ 10 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Overall Flow: Who should Do it? DOING is key (different from thinking, understanding, explaining, talking) Kawasaki: “being an Entrepreneur is a state of mind” (wanting to change the world) Disagree: it’s a state of emotion (almost everyone wants to change the world, rather there must exist TRUST that one CAN change the world) EQ [Daniel Goleman] / AQ [Paul G. Stoltz] rather than IQ

בסד Safety Bolts for Web Doors.™ 11 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Overall Flow: CS Angle? Turing machines are UNIVERSAL (maximally broad applications) CS evolves recursively hence quickly (constant opportunity for new entrants) Simple to deploy world-wide (large $$$ return potential) Cheap to proto (software) / design & patent (hardware) (small initial $ required)

בסד Safety Bolts for Web Doors.™ 12 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Meaning What GOOD will your organization do? (little to read/do “outside” & lots of “inner” asking)

בסד Safety Bolts for Web Doors.™ 13 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Mantra /Tag Line Mantra: 2 to 5 words Mission to inspire Workers (Repeat to inspire, energize, re-energize, re-energize, re-energize, …) Tag Line: 2 to 5 words Suggestion to Customers, as to how/why use your product/service (Repeat to impress, impress, impress, …) Examples: –Nike: “Authentic athletic performance” / “Just Do It.” –ASTAV: “Making cyberspace a humane place” / “Safety Bolts for Web Doors” E-motion!

בסד Safety Bolts for Web Doors.™ 14 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Real World Examples What do you think is the Meaning/Mantra in: HP MSFT Google Yahoo! Compare: Wall Street Journal (Tech section) June 9,08 report on “All Things Digital”, D6.AllThingsD.com

בסד Safety Bolts for Web Doors.™ 15 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. The Project Definition Process Let’s START!

בסד Safety Bolts for Web Doors.™ 16 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Q & A ? Making cyberspace a humane place. SM Thank you. Next session? “The Art of the Start”: read Chapter 1 “The Project”: define & hand-in: Meaning & Mantra Team