בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact

Slides:



Advertisements
Similar presentations
Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
Advertisements

MECH/AREC 581A2 Sustainable Technology Entrepreneurship for Scientists and Engineers The Business Plan March 2, 2011 Rick Turley.
BC Thaker - 25 th January, “IT IS THE EXECUTION, DUH !”
Sales Engineering – SE Bootcamp Module 5 – Building and Delivering Great Demos 7900 Westpark Drive, Suite T107 McLean, VA |
Tattletale Toy Company ®
How To Make More Money In A Month Than Most People Make In A Year With Your Very Own Review Site Goldmine! By Stacy Kellams.
Business plans MGT 470. Feasibility Study versus Business Plan Feasibility = screening opportunities to decide the conditions under which you are willing.
Profit Maximization Profits The objectives of the firm Fixed and variable factors Profit maximization in the short and in the long run Returns to scale.
CSC230 Software Design (Engineering)
The Impact Angel Group Real Impact. Real Returns..
The Business Plan. Why write a business plan? Always when a new venture needs outside funding Early in the planning process when you are looking at a.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 4 How Businesses Work.
Business Plan What is a Business Plan? Defn: “written document containing the guidelines for the business center’s (product/ group of products/
CHAPTER 5 SUPPLY By Mr. Pillsbury 10 vocabulary words.
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. © ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Chapter 4 How Businesses Work McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
A plan for your business Do it for yourself… not just for investors What is a Business Plan?
בסד Safety Bolts for Web Doors.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2005 ASTAV, inc. – Confidential & Proprietary – Patents Pending.
The Art Of Starting Submitted by G.Tapasvita G.Tapasvita 60,MBA,AGBS 60,MBA,AGBS.
Guy Kawasaki By Nagarjuna.R Enroll No: Make Meaning 2. Make Mantra 3. Get going 4. Define your business model 5. Weave a MAT.
Steve Paulone Facilitator Financial Management Decisions The financial manager is concerned with three primary categories of financial decisions:  1.Capital.
Managing the Practice to Enhance Growth and Value Potent and Pragmatic Strategies and Solutions to Help you Grow your Business More Effectively.
Introduction Operations Management Intermediate Business Management.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
By ARDHENDU SAHA MBA-2010 REG NO-8011 AMITY GLOBAL BUSINESS SCHOOL.
Computer –the machine the program runs on –often split between clients & servers Human-Computer Interaction (HCI) Human –the end-user of a program –the.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Copyright © 2016 Pearson Education, Inc.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
InverstorTech Hadas Mendes. Last Few years ? √ What was missing? - BackWeb Market analysis Product defects (bugs) Higher costs Poor Timing (and positioning.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Macintosh Print Controller Team SDMay03-08Advisor Dr. James Davis Abstract The Macintosh Print Controller project attempts to solve a process productivity.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
How do new products come to market???. For the teacher This lesson plan is designed to help high school students learn about how ideas become products.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Product Management. Facts about Product Management Many managers realized that investment in INNOVATION is critical for future growth & even in the survival.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
Product Management Or.. The most important thing most startups forget to do.
THE ART OF STARTING BY SACHIN UPPAL ROLL NO
What’s Coming  Today  Group market research presentations (45’)  Work Session with advisors- market research refinement (30’)  Commercialization options.
© Folens 2009 Learning ladder You must: describe a range of different systems and ways they can be controlled. identify inputs, processes, and outputs,
ENTREPRENEURSHIP DEVELOPMENT V.S.G.Soujanya MBA#8036.
Empowering Legal Teams iInnovate Business Plan Template I agree to the terms & conditions in making my idea publicly available. By, Members.
The Information School of the University of Washington Information System Design Info-440 Autumn 2002.
בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Your Product/Service.
User-centred system design process
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION.
Presentation transcript:

בסד Privacy Restored.™ 1 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. RESEARCH CONSULTING Entrepreneurial Computer Science Yonah Alexandre Bronstein, PhD Session 2

בסד Privacy Restored.™ 2 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Session Outline 1.Administrative Stuff 2.Chapter 1: Personal Experience 3.Chapter 1: Other Fundamentals 4.Homework Check & Refinement

בסד Privacy Restored.™ 3 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Administrative Stuff Office Hour: –Location: Building 58 (Math), Room –105 (basement) –Time: Sunday 2pm – 3pm (i.e. right after class) Textbooks: –G. Kawasaki "The Art of the Start” (Amazon: $11 - $18) –D. Packard, "The HP Way” (Amazon: $1 - $10) –Suggestion? D. Senor & S. Singer: “Start-up Nation: the Story of Israel’s Economic Miracle” (Amazon: $7 – $17, Staimetzky’s?)

בסד Privacy Restored.™ 4 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Administrative Stuff Overflow students… Univ. decision: ? “Auditing?”

בסד Privacy Restored.™ 5 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Personal Experience What do you think is the Meaning/Mantra in: GAIN DDS VERITAS BEZEQ? EL AL? Better Place?

בסד Privacy Restored.™ 6 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1 M&M: GAIN Poor Multimedia support in Relational Databases (back in early 90’s): Input (capture) Storage (efficiency) Output (usability) “Database: the Next Generation”

בסד Privacy Restored.™ 7 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1 M&M: DDS Next generation/sophisticated Document handling? –Single user (desktop) –Office environment (“super” copy machine) Xerox PARC full of ideas, Xerox tired of seeding other start-ups: “internal” start-up “PARC invents & Xerox profits!”

בסד Privacy Restored.™ 8 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1 M&M: VERITAS Really Reliable Storage, for those who couldn’t afford Monster RAID Arrays… “Soft Hardened Storage”

בסד Privacy Restored.™ 9 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1 M&M:BetterPlace Electric Cars + infrastructure of battery-swap stations… Shai Agassi + Palo Alto,CA + Ramat HaSharon,Israel 5 years &

בסד Privacy Restored.™ 10 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Get Going 1.BUILD (something) 2.SELL IT (to someone, for $$ or just words) Gives you a Reality Check: Market Technical capability Team’s ability to work together (So you can fail, fail, fail, and then converge on something that works!)

בסד Privacy Restored.™ 11 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: Business Model Physics: energy flow to keep the machine running KISS: Keep It Simple Silly! Do not invent Ask (only) women for feedback To many investors, that’s the most important slide: “Tell me again, how do you make money?”

בסד Privacy Restored.™ 12 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: M.A.T. Milestones: –Prove concept –Complete design spec –Finish prototype –Raise capital –Ship testable version to customer –Ship final version to customer –Achieve break-even Assumptions: list them to find flaws early Tasks: day-to-day entropy management

בסד Privacy Restored.™ 13 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Ch.1: CS Angle? CS should NOT be the top priority thinking yet (unless problem is in the CS space) Prototype / Architecture considerations: –Want prototype as quickly as possible, –But it will live on much longer than you ever think… –Architecture should be maximally SCALABLE (in size & function) –Prototype should be minimally SELLABLE as a pilot/trial –Proprietary / Open Source? (“What’s your barrier to entry?” 2 nd most favorite investor question) –Patents? –1 fantastic programmer is better than 6 average ones

בסד Privacy Restored.™ 14 ABUSE SUPPRESSION TECHNOLOGIES, ACTIVITIES, VISION. ©2008 ASTAV, inc. – Confidential & Proprietary – Contact for pricing. Homework… Read Chapter 2 and APPLY Chapter 1 to “The Project”: Meaning/Mantra Team (with student Id and address) (Extra Credit): Tag Line? Milestones? “Eat your own dog food!” (D. Cutler) ASTAV v.2: Protect People from Abuse & Fraud! SM