Wednesday, 22 April 2020

Elevator Pitch No. 1

Link: https://www.youtube.com/watch?v=MlyQanNxkzc

Assignment 22A- Elevator Pitch No.3


Assignment 22A- Elevator Pitch No. 3
           

From my past pitch, I listened to the feedback I received and tried to keep the good parts like inflection and tempo the same and incorporate things I could improve on. For example, this time around I worked on memorizing my pitch more effectively so that I don’t break eye contact with the hypothetical audience at any point. From the feedback I received, I understood that this eye contact helps with a clear delivery and makes the audience feel like you’re venture seriously. People are more likely to appreciate a speech that has been memorized, rather than having to watch someone reading something off a paper. I also tried to include more specific qualities of my business concept and why it is important to purchase. By highlighting the dangers of the internet, I also hope I was more convincing this time around. Lastly, I tried to improve on my energy and hand gestures to go hand in hand with what I’m saying. 

Tuesday, 21 April 2020

Assignment 21A- Reading Reflection No. 2


Assignment 21A- Reading Reflection No. 2

Book: The Art of Social Media: Power Tips for Power Users, Guy Kawasaki

In today’s day and age, social media can really help propel a business and reach millions of potential customers around the world. According to Kawasaki, excelling in social media is critical in jumpstarting your business, making sure it can compete with similar business, and increasing its growth potential. In order to excel in social media, Kawasaki provides important tips in this book. These tips include treating your social media with professionalism, creating content that your audience wants to see and allowing for audience feedback and interaction. According to Kawasaki, capitalizing on these tips will allow you to exploit the opportunities social media offers. Treating your business on social media with professionalism will attract potential customers and build trust, because your audience will see that you are taking this venture seriously. This book really incorporates a lot of the concepts we learned through this class. For instance, as Kawasaki alludes to hard work and passion go hand in hand. You must put your all into marketing your business on social media because this is the best way for it to be noticed. Just like taught in this class, you must approach your business from different angles and pour your all into it if you want it to be a success.

In addition, the book states the importance of creating not for yourself, but targeting your audience. If you post things with a purpose and something that will appeal to you audience, you will boost your follower count and increase your potential revenue. In terms of keeping your audience engaged, this is also a very powerful tool on social media. People are more likely to interact with a business and purchase something if they feel like their voice is being heard. If I had to design an exercise after reading this book, I would definitely incorporate making a social media post on Instagram to promote your business. Although it doesn’t have to be real, having practice in developing a social media platform for your business and how to post about your product can really be helpful. Something I learned from this book that really differed from my expectation was that Kawasaki didn’t initially reach success off of social media. Instead, he worked to promote Macintosh in its early development through speeches, presentations and personal interactions. I believe these experiences really helped him understand what customers are looking for, and translate this knowledge onto social media.

Friday, 17 April 2020

Assignment 30A- Final Reflection

Assignment 30A- Final Reflection


Throughout this class, I’ve experienced many highs and lows. There were many times where I underestimated the amount of work it would actually take to develop a business concept. The assignments where we had to interview people that would help contribute to our potential business was definitely challenging, but so informative. Conducting market research and seeing how customers would respond to your product is integral in understanding the scope for your business. Out of all the experiences, however, I believe the most formative experiences were the different elevator pitches we recorded. I can definitely see the growth and progress I made between the first and third pitch. While it pushed me out of my comfort zone, I think being able to talk about your product and sell it a large audience is one of the most integral components of starting a business. Even though I was only in front of a mirror, I could imagine giving the same speech to a crowd of people. Although, this scared me I believe it was great practice to get me ready for a similar situation in the future should I choose to launch this type of business or another. Public speaking is never easy, but as an entrepreneur it can be a great tool to increase your customer base and future revenue. Therefore, I consider the elevator pitches the most joyous experiences and the one that caused me the most challenges. I am most proud of myself for putting myself out there and pushing myself by getting through them. After this class, I definitely think more like an entrepreneur and have developed an entrepreneur type mindset.

Although I wouldn’t go as to far as to call myself an entrepreneur because I have no product or begun to market anything, but I can see a change in how I think. I now consider elements like competition, resource availability and marketing, rather than just coming up with a product that can help people. I now go beyond, about how exactly I can reach an unmet need, tap into unexpected markets, use social connections and exploit opportunities. One recommendation I would make to students going down the same path is to be on top of time management and take the assignments seriously. These assignments are geared toward allowing you to generate a realistic business model and plan. Using these exercises will only help you in the future as an entrepreneur. Time management is also very important because some assignments require intensive research or interviewing many people, which can take a while. In order to get into the right mindset for this class, I’d recommend reading some of the books on the reading list. These books can help encourage you to take the assignments seriously and take your business model to another level.



Assignment 29A- Venture Concept No. 2

Assignment 29A- Venture Concept No. 2


As the world becomes increasingly online, with the outbreak of the corona virus, I think people now more than ever are in the market for a cybersecurity system that would provide effective protection. Banking, shopping an even school is now done online. Protecting sensitive information and private data is significantly more important in today’s day and age, just because the amount of information we put on the internet now. Although there are measures people can take, like sharing less on social media, it is inevitable that Google and other websites will save your personal information. Making sure there is a system in place to prevent this information from getting into the wrong hands could help millions of people around the world. I will use close social connections in the IT and cybersecurity field to develop a cybersecurity system that has multiple checkpoints before it can be accessed, as well as having firewall/antivirus protection. Firewall/antivirus protection will prevent hackers from getting access to people’s private data, or potentially infecting your computer so that all your data is stolen. Having multiple and specific checkpoints will mean that potential invaders will need more than just a simple password or birthday to access the system. I think the window of opportunity for this business will only expand because everything is moving online, however I think now is hot time. This is because with the coronavirus outbreak, people now more than ever are spending the majority of their time online, thereby increasing their risk if they don’t have adequate protection.

My product would initially be sold for less than typical cybersecurity systems that cost thousands of dollars. I would be willing to sell it for around $700 and have a discounted cost of $500 for students and those in low-income markets. This will allow me to tap into markets that also want to protect their online security, but don’t necessarily have the funds to afford a cybersecurity program. These markets can help grow my business and bring in more revenue for the future. Customers will be more inclined to purchase my product because it will offer effective protection at nearly half the cost as most cybersecurity systems. My most important resource in making this venture a reality will be the close family connections I have in the cybersecurity and IT field. Not only can they help develop my product and make adjustments as technology improves, but they also have access to thousands of computers and systems that can be used to test the product before it hits the market. The next step in my venture will be to develop the product and test it on these computers and large systems to make sure it is effective.

The feedback that I got from my previous venture concept was very important because I learned I needed to get more specific for my next venture concept. Therefore, I tried to incorporate specific elements of my venture concept, like exactly how much it would cost, how it would work and why it would be appealing to customers compared to other similar products. While, I highlighted the benefits of having an effective cybersecurity system in my last venture concept, I didn’t get into details as to how I would go about in achieving this. So, in this venture concept, I made sure to address the social connections I look forward to using in order to develop and test this product. By incorporating how the firewall/antivirus system with multiple checkpoints may help providing effective security, I hope I provided a better picture for what I hope to accomplish.




Thursday, 16 April 2020

Assignment 28A- Your Exit Strategy


Assignment 28A- Your Exit Strategy

Since the world is becoming increasingly cyber, and my business involves developing a cybersecurity system that can protect private data, I think it will be a product in demand for a long time. Obviously, as new technology emerges, the software and programming of the system will have to adapt to reflect these changes. Since I project this product potentially helping millions of people for a long time, I intend to stay with the business for several decades and then retire. Despite this, I definitely plan on hiring different people that can take over different sectors of the operation so that I don’t have to concentrate on every little aspect. Having people that I can trust and are from the cybersecurity field are going to be critical in the success of this product. Since I have so many people in my family that are part of the IT and cybersecurity field, I plan to delegate the operations side to them. I would primarily focus on marketing and selling the product to different types of consumers. Once I retire, I plan on giving this responsibility to someone who is just as passionate, if not more, in the venture as me. I plan on staying with the business for decades because I am really interested in helping people protect their sensitive information. As someone who has experienced being hacked, I am aware of the dangers and uncertainties that can exist online. I’ve also had my credit card number stolen, which is actually becoming common with a lot of people. I want to help other people like me, and those who have experienced event worse intrusions.

Since everything is moving online, I believe the market for an effective cybersecurity program will only expand. I hope to make my product a success and help people for decades to come. My exit strategy has definitely influenced my growth projections and use of resources. Since I am dealing with social connections that I am very close with in my own family, and they have resources to get this business started, I don’t initially plan on investing on new resources. Obviously, once my product is launched I will have to invest in additional resources to support the growing business. In addition, as a result of staying with the business a long time I expect a higher growth rate than if I passed the business to someone after 5 years. This is because there won’t be an intermediary transition phase in which someone else has to be trained to fill my position. With this transition, another individual may have trouble familiarizing themselves with the operations, or relating to other members of the team. So I definitely think if I stay on the project for a longer time, it will help growth projections. From my experience, I’ll also know what works and doesn’t and can implement various changes to make the business more successful.

Assignment 27A- Reading Reflection No. 3


Assignment 27A- Reading Reflection No. 3

Biography: Coco Chanel, Lisa Chaney
           
After reading about Coco Chanel I was surprised to learn that she came from poverty. As such an iconic and prominent fashion designer and trend setter in the 20th century, I would’ve thought that she had connections in the industry or came from an affluent family. However, as the book alludes to, her humble beginnings is probably why so many people were able to relate with her and connect with her style. I was also surprised to learn about her many affairs with prominent figures of the time, as well as with a possible German spy. I liked how Chanel pushed boundaries and didn’t let preconceived notions about how women should dress stop her from innovating and creating new styles. In addition, I admired how Chanel pushed for progression of women through her clothing. Although Chanel experienced backlash for designing clothes that were considered not appropriate for women at the time, she stuck with her convictions and didn’t let conservatives stop her from creating. Instead, through this adversity she continued to push for progression and even rebelled against typical standards. Similar to how she overcame poverty, Chanel was able to escape from convention through her passion.

Throughout the book some competencies Chanel exhibited were resilience, hard work and networking. Chanel was conscious of her humble background, coming from an orphanage and working as a seamstress. Whenever she would face struggles later in her life and as she started expanded her business, she would rely on how she overcame hard times in the past to help her get through these struggles. The resilience she showed proved to be key as she became a cultural and fashion icon in Paris and throughout Europe. Another aspect that really helped Chanel was how she networked with prominent men of her time to achieve status and connections to help her grow her business. Whether she took them as lovers or friends, many of them Arthur Capel helped her to launch her “little business.” One part of the reading that confused me was the rumor that she potentially had a German Nazi spy as a lover late in her life. I don’t know if this was a fact or something that was circulated to discredit her and her work. From the reading, I gathered that there were many people who weren’t a fan of Chanel’s progressive attitude, so I can see why they would start this rumor. If I could ask Chanel two questions it would be how did your early life impact your designs and ideals in fashion later on? I would also be curious to know how her business was able to grow during a time when the world faced two world wars. From everything I know about Chanel through her biography, I definitely think Chanel viewed hard work was a tool to exploit. I agree with this because although many people big dreams, not everyone puts in the blood, sweat and tears required to make it a reality. Even with people that work hard, they are often required to go above and beyond to achieve their dreams.

Assignment 26A- Celebrating Failure


Assignment 26A-Celebrating Failure

This past semester, in addition to taking a heavy course load, I thought I would also be able to study for the MCAT and take it in April. Since I’m a junior and hope to apply to medical school this spring, it was critical that I take the exam now and get a relatively good score. The alternative to not taking it would mean that I would have to take it over the summer and apply late in the cycle, or potentially take a gap year. I’m someone who thinks they can do everything and likes to be involved in a lot of activities. I definitely underestimated the amount of material on the exam and how hard it would be. Along with school and my other activities, I just couldn’t keep up with the rigorous hours required to study for the MCAT. My lack of understanding and trying to do too much at once was exacerbated by the coronavirus situation. Once I began taking practice tests and failing, I realized I was nowhere close to the score I had imagined. I realized that I would need to dedicate full time studying to just the MCAT and would most likely have to take a gap year. While this failure was hard to accept, I knew that I would do much better and have a better quality of life if I just tried to do a few things at once. The fact that I was trying to do both school, extracurricular activities and the MCAT at the same time meant that I wasn’t able to give full focus and dedication to any one of these.

I definitely had to fail to realize that no matter how hard you try there are just some things out of your control. You can’t force things and try to do everything at once. Instead, you should work hard and do as much as possible without sacrificing your health or relationships. Overall, I think failure is one of the hardest things to accept and go through. Not only does it take a hit on your confidence, but it can also cause you to feel ashamed or less than. You could feel like a disappointment or like you let other people/yourself down, but as long as you learn from your mistakes and actively work to adapt and adjust to eventually achieve your goal, you are on the right path. Failing to take the MCAT, and having to take a gap year, is definitely disappointing and I always think if there was anything more I could’ve done to make it work. However, what I realized is having this mindset is not going to help me moving forward. I have to realize that I gave it my all, but was just trying to do too much at once. 
Overall, now I am proud of the hours and grind I put in and know that it will help me in the future.

This class also helped me change my mindset and views on failure because after reading/listening to stories of different entrepreneurs and doing various exercises to develop a business concept, I realize that if you ever want to accomplish something you have to dedicate full time and effort to it. It isn’t possible to start up a business, and market it, if you are doing a hundred other side projects. Dividing your workload and conquering one thing at a time will yield better results. A positive mindset and resilience is also key. For instance, if the Wright brothers gave up after their hundredth crashed flight, who knows when the first plane would’ve been created. All in all, I believe failure is an integral component to success and should be something we all learn from so that we can adapt and become better.

Friday, 10 April 2020

Assignment 25A- What's Next


Assignment 25A- What’s Next
Existing Market:
I believe what’s next for my venture in the existing market is for me to get together with the contacts I have in the IT and cybersecurity field and build a cybersecurity system that offers comprehensive protection. When I interviewed my uncle who works as a cybersecurity consultant for AMBAC insurance and asked what should we do that we aren’t planning to do? He stated we need to build a team that can actually be committed to this project. No one person can accumulate all the data and software to come up with this system. We need multiple people working on this project. Everyone on this team will also be working other regular jobs, so it is important that we take that into account with the time frame. When I asked him if customers were on the market for an effective cybersecurity system, he said it is a great time to go into this business. According to my uncle, as the world is becoming increasingly cyber there is demand now more than ever for cyber protection. Companies want to make sure that their private data, as well as sensitive information about their consumers is protected.
The second person I interviewed was my cousin Pujan who also works in cybersecurity. When I asked him what should we do that we aren’t planning to do? He stated that there are new changes in technology and new viruses that erupt daily. It is important that we as a team have enough people to stay up-to-date on these adaptive threats. We need to evolve and adjust our system with the same speed as hackers and those looking to commit fraud. When I asked him what customers may want next out of a cybersecurity system, he said people would definitely be interested in is a system that doesn’t offer easy access. These days when everything about our lives is stored on the internet, we don’t want this information to get into the wrong hands. As Pujan alluded to a system that grants access to only those authorized to view information is essential. There are many ways to circumvent this, but we need to implement additional roadblocks for hackers. The third individual I interviewed was my cousin Nidhi, who works as an attending resident at Mt. Sinai in New York. When I asked her what should be doing that we aren’t, she stated that it was important to analyze breaches that have occurred in hospital systems and other large corporations. By analyzing this past data, you can gather how leaks occurred and how to prevent similar mistakes in the future. When I asked her what my customers might want next, she said a cybersecurity system that won’t cost thousands of dollars. Average workers and students don’t have that much money to prioritize towards cybersecurity. Providing something that is effective, but affordable is key.
Following my interviews, I agree that I need to deliver on creating a safe, comprehensive and relatively cheap product. Once I am able to produce this sort of product, I think the next step for my venture to grow in the existing market is to promote as much as possible. When an average person is on the search for a new cyber security system, it isn’t always evident what technology is the best, what sets one apart from another or even why it is necessary in the first place. When my product comes out I am going to reach out to the contacts I have in media, as well as social media influencers, so that the masses can hear about it.
Being able to reach millions and make them understand why it is unique and necessary could have a significant positive impact in building my consumer base. Another thing that could help grow my existing market is to make apparent the existing threats that exist online. I think in today’s day and age we kind of just accept that everything is recorded by Google and all our records saved. However, this can be very dangerous and past examples of cyber theft and hacking should be brought to light in the media. This increased circulation will heighten concern, and make people more aware of the need for effective cybersecurity.
New Market
Another market that I also plan on targeting is the poor portion of society. I understand that many people with economic struggles, are not going to prioritize a cybersecurity system. Despite this, I am willing to highlight all the reasons they should and offer breaks and discounts to all those that subscribe to an annual membership. Having less funds means that you have more to lose if fraud is committed at your expense. Online transactions have a high chance of being monitored and tracked. This make poorer people just as susceptible to credit card fraud, and other leaks that could cost them thousands as everyone else. However, unlike everyone else, poorer people have more to lose. To understand this new market, I first interviewed my friend Aditya who is a third year college student at Carnegie Mellon. As a student who is primarily paying for his own education, he barely has enough money to get a week’s supply of groceries. When I asked him how my business may help someone like him, he stated that if it was affordable enough it could help him incur any fraudulent charges or issues. When I asked him what adaptations I should make to appeal to people that may not have much money, he said it was important that I keep the price point in mind. He said I could run promotions at special times in the year, where people like him could potentially capitalize on some needed protection.
The second person I interviewed was my friend Jenna, she is going to dental school and like Aditya doesn’t have extra money to shell out on products not needed for sustenance. When I asked her how my business may help people like her, she stated that it could give her some comfort and security in knowing her credit card information, identity and other sensitive information is being protected. When I asked her the adaptations I should make to appeal to someone like her, she again touched on the price. She stated if the price was kept lower for those in graduate school, college or other professional school, I might see a huge increase in subscriptions.
After interviewing this new market I was surprised to see that even people with not a lot of money were still willing to purchase a cybersecurity system for the right price. As long as my product was offered at a substantial discount, they would be willing to designate some funds for peace of mind. Both the people I interviewed acknowledged that if financial fraud or other hacks were committed against them, it would cause a great deal of damage and stress. Due to this sentiment, I believe the assumption I had that poorer people have more to lose to be correct.
If someone only has $50 in their account and $30 is fraudulently taken out, that person is going to have significant stress the next day when they call their bank trying to get their money refunded. However, with increased cyber security, the chances of such fraud occurring because of an online transaction and greatly diminished. I think this market is as attractive as my existing market because with diminished prices for students and other struggling workers, I believe I will increase my consumer base. This will eventually make me popular in places of diverse income and help me grow.

Thursday, 9 April 2020

Assignment 24A- Venture Concept No.1


I believe there is a great need for better cybersecurity software. These days, everything we do from banking, to school, to documenting of health history is conducted online. This poses a serious threat that anyone with malicious intentions to commit fraud, or otherwise steal sensitive information to sell to a third party, can easily do so. Software and antivirus programs that currently exist on the market can be very expensive and not provide effective coverage. We’re constantly hearing of leaks of private information, social media accounts getting hacked and credit card fraud. There is a significant unmet need to improve cyber security for individuals, as well as companies, businesses and health care providers. No one wants their identity, social security or other sensitive information being leaked to those looking to commit transgressions with it. Private data should be kept private. In terms of hospitals and health care providers, often times, patient files are recorded on an online system. If this system does not have adequate protection, health histories and other sensitive information could fall into the wrong hands. These unfortunate people who have their information stolen and made public could be susceptible to everything from wrongful employment discrimination to termination. Since I have a lot of family members that work in the health care as well as in hotels/motels, I know the online systems they use to keep records isn’t that secure.
Although there are standard security measures like a password and login, there isn’t much else required to access the system. Once in, all that is often required is entry of a birthdate to access a customer/patient file. There should be a system that employs multiple checkpoints and runs various scans before access can be granted to such private data. That’s where my new cybersecurity software system comes in. I am proposing a system that incorporates multiple checkpoints, along with antivirus/firewall protection that can secure our networks. Not only would this save companies millions in reimbursement, but it would prevent the stress and turmoil that could ensue from foreign invaders gaining access to your sensitive data. There should be system that exists that requires much more than a simple password and birthdate to access consumer’s file. I think the window of opportunity for my product is huge considering most business transactions, and record keeping is done online. With the outbreak of the coronavirus, everything is moving online. Everybody wants to have a secure network to operate from and be worry free that whatever they put into the cyber space isn’t stolen and used for malicious purpose. Essentially, I am offering a cybersecurity system that provides comprehensive protection from invaders by integrating a checkpoint system with firewall/antivirus protection. The system will also have face recognition with checkpoints of its own, so no unauthorized users will be able to access sensitive information. In addition, my product would offer a holistic system so that it can be used by businesses as different as hotels and hospitals.
Quality cybersecurity systems, like those provided by Siemens and Norton, sell at an average of $1000 and more. Since my system will have the benefit of being tried and tested and created without much initial investment due to my connections in the industry, I will try to sell it for half the price at $500. In addition, I will include a package that if renewed annually, a discount of $50 will be included. Members will also enjoy benefits by accumulating points for free scans and file cleanups. I hope these measures will help me outcompete some leaders of the field. While my innovation is a fairly new idea and hasn’t even begun to being developed, I think once it does hit the market customers will be drawn to it. Customers will see that it is much cheaper than some of the leading cyber security software’s and will be tempted by its promise to offer comprehensive protection. In addition, I will use my connections in advertising in the media to promote the product as much as possible. Social media will also be a big platform of promotion. The main selling point will be highlighting the threats that exist on the internet. When it comes to cyber security, not much is marketed on tv, radio or social media. The average person is unaware of the various software that exist and the resources that make one company better than another. The more they see a certain company’s cybersecurity advertisement or hear about its benefits, they are more likely to look into it and talk about it with their close circle. In the end, they will be likely to purchase our product and help spread word about it along the way.
Other companies for cybersecurity don’t really make advertising and branding a priority, as much as they could. I feel like focusing on this aspect can really give my product some edge. Another benefit of my product would be that it wouldn’t take up too much space and be a simple download that doesn’t need any instore travel or hassle. There will also be a support line so that people can get immediate help when trying to set it up. Idealistically, my business would have over 1000 employees and we would be able to dedicate a team for solely support/setup, another for updates and any problem utilizing the system/ and another for marketing and promotion. The base of my staff would be people in the IT and cybersecurity field, who are trained to make changes as the world adapts to new security measures.
Like a real virus hackers can adapt, so it is always necessary to stay up-to-date with the latest technology and viruses that exist. For this reason, I believe my most important resource will be the family connections I have in the IT and cybersecurity field. Not only will they help me develop my cybersecurity product, but they can help me test it on a large network. I believe for my venture the next step will be talking to my family members in these fields and starting to develop a product that can offer comprehensive protection with multiple checkpoints. Even though no system is completely full proof we can try to get as close as possible. In the next 5 years I hope to atleast have a product that delivers on this promise and begin marketing it. Through social media and my connections on the news I hope to engage as many into the topic of cybersecurity as possible. I hope that this will increase interest and a potential consumer base. This first venture will be my introduction into the business world. I will learn all the dos and don’ts and realize how the corporate world is actually run. From this point on, I will expand my businesses from the knowledge and experience I have gathered. I’m sure I will make a lot of mistakes along the way, and hope to learn from them as well.   

Assignment 23A- Your Venture's Unfair Advantage


Assignment 23A- Your Venture’s Unfair Advantage
1)      Contacts in the cyber-security field that are in charge of protecting large networks and companies.
This is a valuable resource because these people can help me develop a product that is actually effective in protecting people’s online data. I think this is a rare resource because not many people can say that they have so many family members and close family friends in the IT and cybersecurity field. Not only does this mean that they’d be willing to help me without looking for much in return, but I would have extremely qualified people working on the job. Their daily tasks entail protecting their companies from online invaders, so they are aware of the software needed, and the tricks hackers use to steal sensitive information. All this knowledge combined means they could really help produce a product that is effective in protecting sensitive records and data. I also believe this resource is non-substitutable because the knowledge and experience these individuals bring to the field is hard to replicate.
2)      Access to hospital/motel/hotel data for records and statistics on cybersecurity lapses in the past.
This information can also give me insight on the methods perpetrators may employ to hack or steal sensitive information. I also have family that works within hospital administration and run hotels/motels. This is both a valuable and somewhat rare resource. Not only will I be able to increase my understanding on how stealing of customer information has occurred in the past, I’ll know the current measures these places are taking for online protection. Once, I understand this, when I create my product I can make sure that it does much more and offers a wider range of protection than what most hospitals/hotels/motels currently have in place. In addition, should I want a place to test out my product, I can always try it out at one of these places. Due to again having these connections, once again in my own family I believe this resource is non-substitutable.
3)      Laptops/computers for testing
Having access to different types of laptops and computers will be essential in testing my cybersecurity software. The fact that my dad has access to thousands of different hp/mac/and windows computers will really help me in terms of conducting trials. I think this is quite a rare resource because not all startup cyber security programmers can gain access to thousands of computers for trials without a payment or giving something in return. I also think this resource is nonsubstituable because there are no other resources that can compare to having access to many different laptops/computers. In order to test the efficacy of my software system I need to make sure it runs smooth on all types of networks and computers.   
4)      Consumers willing to try the product
Following my interviews, there were some people I talked to who were already saying that once my product comes out that I could test it on their company. I believe this resource is very valuable because having a large company utilize my product will not only give me great feedback, but potentially thousands of new customers should they like the service. I don’t believe this resource is rare because many people can find places ready to accept cybersecurity help for no initial charge. Despite this, I think it is rare to have people already willing to say they’d try out a software system before it is even released based on connections. Due to this, I think this resource to a degree is nonsubstituable.
5)      Connections to people in news and radio that could help me market the product.
My best friend’s father works at both NBC and MSNBC, which could really help me in marketing once my software is developed and ready to be sold on the open market. This is a very valuable resource because making your product more known and talked about is a great way to attract customers. Even if the people that hear about it don’t buy it, if they talk about it, like or share it that could really help spread the word. I believe this resource is both rare and nonsubstituable because products may take years of development, financial pushing and marketing before people start to give it attention.
6)      Social media that can also help me promote the product.
Although I don’t have that big of a following, I know if I am somehow able to market my product on Instagram, tiktok etc. so that it reaches a broader audience, it will really get more people talking about cybersecurity. I think this is an essential and rare resource because the more people know about your product, the more customers you are likely to attract. However, I think it is rare to get much notice on social media, especially because there are so many users and content creators. Getting endorsements or making a product go viral can really have a significant impact on the growth of your business. I believe this resource to be nonsubstituable because in today’s day and age more people obtain information from social media than the news.
7)      Freedom to access mostly everything on the internet
It is a valuable resource to live in a country that doesn’t really restrict internet use. We can access sites and networks of various countries, and by doing so we can get introduced to their online systems. If we become familiar with their systems, we can try to guess how they may use various programs to hack into American computers and networks. I don’t believe this is a very rare resource because a lot of other liberal countries like Canada, UK and Australia exhibit limited censorship. I also don’t think this resource is nonsubstitutable because there are ways around censorship and restrictions in most countries.
8)      Access to advertisers
Learning from professional advertisers in the media can be very valuable tool because teach me the best ways to push my product. I can learn how to convey its necessity in every home and corporation, why it is the best over competitors and how it will protect millions of people from online invasion. Having professionals who have had years of experience in advertising is both nonsubstituable and rare.
9)       The news, to figure out creative methods people have used to hack systems, and measures people can take to boost security.
Learning from previous leaks and breaches of private data, gives us a great pool of information. This is a very valuable resource because it allows us to see what the implemented protection was at the time of breach, how hackers were able to get around the protection and the resulting impact. Therefore, when we create our software we can ensure that these mistakes are not made and additional reinforcement is added so hackers are unable to access sensitive information. While I don’t think this resource is rare because this information is accessible to everyone, I do believe it is nonsubstituable because this pool information is critical in understanding the mistakes of the past and not repeating them.
10)  Energy & Time
As a young student, still in college I believe that energy and time is a valuable resource I have. Although its not that rare because many other students my age could have similar ideas. I do think my work ethic, resilience and drive will help me in this endeavor. I also believe this resource is nonsubstituable because there is no replacement for dedication and grind.

Ø  I think my top resource is having connections to people in the IT and cybersecurity field. This is because they are the ones who can help me develop my cybersecurity software, with multiple checkpoints and antivirus/firewall protection. In addition, they can give me new ideas to implement into the system because they know the latest trends and methods of attack in the cybersecurity field. They also possess networks/and computers where this product can be tested before it is marketed and released. Having these close connections is my most valuable resource because without them my product wouldn’t be able to become a reality.

Friday, 27 March 2020

Assignment 20A- Growing Your Social Capital


1)      Domain Expert: Pujan Kavi
Through my father, I came in contact with Pujan, who works as a cybersecurity consultant with Bank of America. As someone who has been trained in cybersecurity, Pujan is aware of many of the threats that exist online. He says the best advice he can give when it comes to cybersecurity is to share as little as possible and not keep sensitive information, like credit card or social security numbers saved on your computer. Even though Google saves 99% of everything we enter online, there are measures we can take before cybersecurity experts get involved. According to Pujan, data breaches and hacks are commonplace in his field of work. Since he works for Bank of America, which is responsible for the financial information of millions of users, he knows the importance of maintaining security. Along with his team he makes sure all data servers are running and only authorized personnel have access to the financial records of clients. Like most banks, Bank of America encourages online banking and transactions. In order to ensure that practices like this can continue, Pujan works behind the scenes to install antivirus/firewall protection, code cybersecurity programs and stay up to date with new technology and potential enhancements for his company. I found Pujan through my father who is also a computer engineer. My father and Pujan took cyber security classes together in college. When I asked Pujan about my potential business idea, he said it definitely was necessary. As the world becomes increasingly cyber, the threat of attacks and hacks are becoming more and more prevalent. As a result having security systems in place to hinder such activities would only help in the long-run. In return for his feedback, I thanked Pujan and would love to work with him in the future. If I could combine Pujan’s expertise in cyber security with my idea, I can develop a concrete product that could help millions of consumers worldwide. By making this contact, I can exploit the opportunity to protect people from having their private information hacked or leaked by those looking to commit fraud or use this information for malicious purposes.
2)      Market Expert: Sanjiv Dave  
I met Sanjiv through my Uncle, as they both work in the IT Department at AMBAC insurance in New York. Since AMBAC insurance represents thousands of clients, a lot of information is gathered about them by the company. Everything from people’s financial records to their social security is collected so that adequate research can be done into whether that individual would make a good client or not. Since AMBAC is an insurance company, Sanjiv and other’s must make sure that whoever the company chooses to represent doesn’t misuse their trust and funds. In return, it is the company’s job to protect the private data of their clientele. Sanjiv must make sure that online files are kept private and don’t fall into the wrong hands. When I asked Sanjiv about my cybersecurity system and if he would potentially be interested in purchasing it in the future, he said if it actually came to fruition he would definitely be in the market. As he stated, there is a need now more than ever to adapt to technological changes and new strategies hackers have implemented to steal private data. It is his responsibility to stay vigilant and up-to-date about all products and services on the market to help him secure his company. According to Sanjiv, if my product enhances cybersecurity with multiple checkpoints and an effective anti-virus/firewall, he would love to try it out in his company and at home. After talking with Sanjiv, I thanked him for his feedback and promised him in an update in a couple of years. I believe Sanjiv and AMBAC insurance represents a large market in the future, because they need effective cybersecurity to ensure that thousands of clientele are protected from online theft.
3)      Supplier: Bhavik Vyas
Bhavik works for Norton Security, which is a cybersecurity program for computers around the world. Norton runs numerous scans, live updates and file cleanups to free up space and prevent viruses from taking hold of computers. As someone who supplies this cyber security program, I asked Bhavik what he thought about my business model. While he said it was definitely needed in today’s day and age, he said I needed to come up with factors that would distinguish me from other competitors. For instance, he said Norton, McAfee and other security programs are all interested in protecting private information and data. He said being able to identify what makes my cybersecurity program standout is really give me a business advantage in the future. Again, I came into contact with Bhavik through my father as they had collaborated on a security project for my dads company in the past. I thanked Bhavik for is very constructive advice and definitely want to implement his tips into my updated plan. I believe he’s advice will really allow me to exploit the cyber security market in the future.

Reflection: Upon interviewing a supplier, market expert and domain expert I can safely say I got essential feedback that will enable me to develop a product that can help millions of people keep their sensitive information secure online. After talking to my three interviewees, I not only expanded my network, but I build connections that could one day help me build a substantial product. As of now, I have no formal training in cybersecurity or IT. However, building these connections gives me hope that I can have the help of individuals in the field to make this cybersecurity system a reality. I also identified potential markets to sell this product to once the time comes. Overall, I believe this process was so valuable and I look forward to doing similar exercises in the future to expand my knowledge and make new connections.

Assignment 19A- Idea Napkin No. 2

You:
My name is Shivani Dave and I am a junior at the University of Florida. I hope to obtain a dual degree in both biology and business, as I hope to one day open my own medical practice. While I want to have my own practice and even maybe start a company, I recognize that cybersecurity is of upmost importance. In whatever endeavor I undertake, I want to make sure that the personal information of my clientele is protected. If patients have trust that their sensitive medical records and other information, like credit card numbers/birthdays are kept secure, they are more likely to stay with my business. In addition to cybersecurity, I hope some of my talents will also lead me to success. For instance, I am a very flexible and open-minded person. This can allow me to adjust to new circumstances or problems that may arise, as well as adopt new ideas that may lead to innovative techniques. Another good quality I have is that I take failure well. Rather than being discouraged or giving up after receiving negative feedback, I try to learn from my mistakes. I understand what I’ve done wrong and try to improve next time around. Although I don’t have much experience in the business world, I have seen relatives run their own practices and I hope to gain experience from them. By applying their experience with my skills, I hope to one day run a successful business. I want my business to keep patient security as its upmost priority, and thereby build a loyal consumer base.
What are you offering to consumers?
I am offering a cyber-security system that ensures consumer safety. Nowadays everything from banking, school to even doctor visits are conducted online. Providing an online platform people can go on, where there is little to no threat of hacking or leaking of private data, is essential. My cyber-security system would have multiple checkpoints and up to date antivirus/firewall protection. These checkpoints would ask much more than a birthday, code word or company password in order to log on to the system. In addition, the firewall/antiviral programs would be tested and put up against companies specifically targeted at stealing private information. With these measures, I hope to provide a cybersecurity system that will ensure consumer safety.
Who are you offering it to?
My product/service is for everyone all over the world, but especially for businesses looking to build their consumer trust and reputation. In today’s cyber world, everyone is impacted by online hacks and leaking of sensitive data. Cyber fraud and identity theft are also on the rise. This means that in some way or another, everyone is subject to cyber security threats. Having adequate protection is essential to impede those looking to steal your private information. Businesses that adopt my cyber security program, will see an increase in consumer loyalty as people are more likely to interact with businesses that protect their private information. This will in turn lead to a larger consumer pool, who will spread the business and enhance its reputation in the long run.
Why do they care?
When people go online or interact with a business, they want to make sure that their credit card numbers, social security information, medical records and other sensitive information is kept private. They don’t want fraud or identity theft to occur and they definitely don’t want someone to gain knowledge about their personal information and sell in to a third party. Mostly everyone with a phone or computer cares because they want their private information to be protected.
What are your core competencies?
My core competencies are being resilient and hard-working. I know creating such an in depth cyber security system will require a large team and a substantial amount of trial and error. However, one thing all my friends and family can attest to is that even if I get knocked down a thousand times, I always adjust what I did wrong initially and try again. Another factor that can help me in the future, is the connections I have with doctors and software engineers in my family. They can help me understand the problems out there to a better degree, and help me create a program that will truly match consumer needs. They can even help me get in touch with people that will increase my network and consumer pool once I choose to launch my business.

While I believe all the elements of my potential business plan fit well together, there are some questions as to how this will be achieved. For instance, if I come up with a cyber security system and market it to everyone, there is a chance that people looking to commit fraud will buy it and use it for malicious purposes. They may purchase it and figure out how to crack it and then use this knowledge to hack onto other systems to steal private information. Although there isn’t a foolproof plan to prevent this from occurring, if I can somehow find a way to screen who is buying my product I can figure out who wants it for genuine reasons from those looking to commit fraud. Another detail I haven’t worked out yet is how to incorporate this system into a large company. Even though the head of a hospital may adopt this cybersecurity program, they must provide training on how to use it effectively. Without this additional training, employees may be confused and not use it correctly. The downside of this would be that the business would still be under threat, due to improper use or complacency. Despite these questions I have about integration and circulation, I believe the ideals of my business model fit well together. With a little bit of trial and error, I believe other elements will also fall into place. Feedback Memo- Two main points I took away from the feedback I received on my last idea napkin was the importance of acquiring knowledge and experience, as well as being able to apply this to the real world. When writing this idea napkin, I tried to highlight the current knowledge I do have, and how I plan on increasing my network and knowledge about cybersecurity.



Friday, 20 March 2020

Assignment 17A- Elevator Pitch No. 2


Assignment 17A- Elevator Pitch No. 2
2)      My video did not upload correctly last time so unfortunately, I wasn’t able to receive any feedback on my last elevator pitch. However, looking back, I definitely could’ve improved on my inflection, flow and making more eye-contact with the hypothetical audience. I tried to incorporate these tools in this elevator pitch. I also tried to emphasize the threat of cyber-security and why it would be smart to purchase this product right now. By heightening people’s sensitivity to the matter, I hope it’d attract more potential customers.
3)      Based on my own assessment of elevator pitch No.1, I tried to talk louder and annunciate between my words. In my first pitch, there were times when I would mumble or wouldn’t be clearly audible. So, I definitely made a concerted effort to be as clear as possible and make useful hand gestures to help with the pitch. I also emphasized the reasons behind why people should purchase this product. Last elevator pitch, although I touched on why consumers should be interested in securing their private data, I didn’t really highlight all the threats. In addition, I added a conclusion this time around. During my first elevator pitch, there was more of an abrupt ending. This time I ended the pitch with why it was better to be safe rather than sorry, and asked the customers a direct question about what they were waiting for.

Assignment 18A- Create a Customer Avatar



Assignment 18A- Create a Customer Avatar
My customer avatar is an average cybersecurity employee at a tech company. As he’s responsible for the safety of his company’s personal data, he is on the lookout for software that will enhance security checks and also implement a tougher firewall/anti-virus program. In today’s day and age, the threat of online intrusion and leaks is very real. My prototypical customer is someone looking to prevent hacks and stealing of sensitive information that could compromise people in his company. I would imagine my customer to be somewhat tech savvy, have had negative experience with online invaders and is responsible for protecting personal/private data. They would commute to work every day in a black SUV, to be as covert as possible, and have a family they are also looking to protect with cybersecurity at home. Hypothetically, they would have 2 children at home and they would be in their early teens. As a father, my prototypical customer would’ve already instructed his children on the dangers of the internet and implemented measures to protect his families’ private records/information. My prototypical customer would be in his late 40s-mid 50s, but would definitely feel younger. They would be updated on current politics and be interested in reading about new developments in cybersecurity. They would try to gather as much information as possible to simultaneously protect themselves and their families, as well as the corporation for which they work for.

There are many things I have in common with my prototypical customer. Even though I am not a cybersecurity employee at a tech company, I too want to protect my private information from online hackers. These days banking, shopping and even school are online. With the outbreak of the coronavirus, much of our time will be spent online. We need to be able to protect out credit card information, academic credentials and other sensitive data from people trying to steal it. So like my prototypical customer, I am also on the lookout for new antivirus/firewall protection that runs multiple checkpoints before someone access granted.  I find that the things I have in common with my prototypical customer are not a coincidence, but merely a reflection of my personal concerns. In addition, I believe these worries are shared with the majority of the population. We all hope that sensitive information doesn’t fall into the wrong hands as the world becomes increasingly cyber.

Friday, 13 March 2020

16A- What's Your Secret Sauce?


1)      Five ways in which I think I have human capital that is truly unique is that I am very open-minded. I have my own individual thinking and beliefs, however if an opportunity comes along I am open to adjusting my views. In that way, I’m very adaptable as well. In both business and life, a lot of situations don’t go as plan. Being able to shift with the situation and mold yourself to current circumstances can really help if there is a major change. Another quality that makes me unique is that I am very resilient. Even if a hundred doors are closed on me, I still find a way to get to my goal. Although I listen to other people’s opinions and am willing to compromise, if there is something I really believe in, I will fight to get it accomplished. Another trait that would really help me as an entrepreneur is that I am very approachable and easy-to-talk to. People who support my beliefs and even those who oppose it feel comfortable around me. I am able to have an open discussion and shift my viewpoint if someone else’s view makes better business sense. Lastly I am very loyal, while this can be a blessing and curse, I believe it will help in entrepreneurship. Anyone who is willing to help me in my journey, I am likely to build an extremely trusting relationship with. Although this doesn’t mean that I am reliant on others, I just build close connections that could come to use should I ever need them.
2)      From all the interviews I conducted, the majority of people said I was friendly, hard-working, approachable, determined and creative. I believe all these attributes, combined with the fact that I’m not afraid to fail will really help me in entrepreneurship. Although other people may possess some of the traits listed above, most people give up after getting knocked down and being denied over and over again. While I have never been exposed to too much of the business world, I have had extremely trying times through which I have always found a way to bounce back or adapt. This is why some of my friends also stated that I was determined and hard-working. The interviews are uploaded on the following links on YouTube  https://www.youtube.com/watch?v=mDXWzKxibvA , https://www.youtube.com/watch?v=-_18UU6b09w , https://www.youtube.com/watch?v=mNBLB7JOyaA ,
3)      I believe for the most part my interviewees were correct in how they view me. Despite this, I think I do have to work harder to truly live up to all the affirmations. For instance, although I am good with people and very friendly, I can do better in maintaining close connections and also building a network that will one day help me should I decide to run a business. I also think I need to improve my time management skills. Although my friends stated I was diligent and hard-working, I feel as though I would get so much more accomplished if I improved on not procrastinating. However, I do acknowledge that I’m creative, friendly and love to be challenged. Whenever something comes too easy, I am always suspicious about it and am not afraid to grind. If I could make any corrections to my list above after interviewing 5 people, I would add creative and hard-working. This is because for entrepreneurship, innovation is key. Adding something that is completely missing from the market and being able to add your creative spin on it can really go a long way.

Thursday, 12 March 2020

15A- Figuring Out Buyer Behavior No. 2


The segment of interviewees I chose were people who had been hacked or had a problem with online leaks in the past. For my first interview, I chose my roommate Caroline who had inadvertently liked a Ray-bans ad on Instagram and subsequently found Ray-bans ad posted to her Instagram page. All she did, was accidentally like an ad and then had her account “hacked.” After talking with her I realized that she really wanted to find a way to protect her privacy, especially on social media. Although she is on the lookout for a better protective/anti-virus system, she acknowledges her limitations. She isn’t willing to spend a lot in order to secure her private data. As a college student, she has a lot of other things to pay for before she can devote substantial money towards online safety. In regards to quality and style, she definitely prioritizes the former over the latter. According to Caroline, regardless of the looks of a security/check-point system she wants it to be effective. She wants something that will offer quality protection if she pays for it. Another thing she mentioned, when asked what she would prioritize when purchasing, was a system that wouldn’t take up too much space on her computer. She takes a lot of online classes, has pictures and other things already clouding her laptop, so downloading a program that will take up a significant portion of space isn’t ideal.

When I asked her if she was more likely to purchase a security software online or in-person with someone knowledgeable about the subject matter, she said she would rather do it in-person. This is because she isn’t aware of all the systems out there, and feels if she went to someone who understood her needs and was able to provide a cheap, safe solution it would be better. She said she would most likely use a credit card to make the purchase and try to do a free trial period, so if it isn’t effective she can cancel her subscription. When I asked her who would be involved in the purchase decision, she said she would definitely consult someone at a tech-store, as well as her dad before making a purchase. She judges the “rightness” of a purchase based on how much use she gets out of it, how long it stays in good quality and how effective it is. She knows she’s made a bad decision if there is a cheaper alternative on the market that achieves the same purpose and is just as good in quality. Also if a product wears down or breaks right away, she says she probably could’ve made a wiser decision.

The second person I interviewed was my cousin Nidhi who is currently an attending resident at Mt. Sinai. A few years ago she witnessed someone trying to steal patient records and data from her hospital and notified heads right away. Ever since then, her hospital has improved its cyber-security tremendously, but is still looking for ways to effectively secure sensitive patient information. Although she isn’t in charge of purchasing a system to achieve this, she can lend her opinion to those that are. When I asked her if price matters, she said to a degree, but since her hospital is one of the biggest in the entire country, they’d probably be willing to spend a lot in order to ensure security. In addition, she said quality rather than style was most important. Patient records can be mishandled and used for malicious purposes, so a system that protects this online data effectively is what matters. Another factor she mentioned was the importance of more checkpoints. She said that while their current system has multiple checkpoints, the information needed to access patient files isn’t very hard to find. Having a security system with passwords and key information that isn’t easily accessible is what would really help secure the system. Our hospital is most likely to purchase a security system online because we are trying to update our cyber-security.

According to Nidhi, since this would be a system to enhance the online security of the entire hospital they would most likely finance the purchase. The heads of our department and IT team would be in charge of the ultimate decision and purchase. Nidhi states that when she thinks about right purchases she made in the past, she thinks about products or services that she used over and over again, an made life easier and fun. When she thinks about bad purchases, she thinks about stuff she bought that only got a 1 time use and are still in storage to this day.

The last person I interviewed was my dad who works in the IT department for Cerebral Palsy in New York. Since my dad is one of the managers at the IT department he is in charge of purchasing software that is up to date and effective in protecting thousands of computers and servers. When I asked him if price matters, he stated that while he considers price, he mostly takes into account quality. He looks at the software and how a product is manufactured before purchasing anything. For a security system, he also takes into account whether or not a company offers a trial period. Since my dad manages so many computers on a daily basis, trying out a security system before implementing it for the entire network is essential. He always wants to make sure he’s a step ahead of people trying to steal information from the company and private user data. According to my dad by analyzing critical information of a security system and comparing it to others out there, he usually makes purchases online. Since he works for a big company, this purchase is usually financed. When I asked my dad what he considers a right purchase he stated something that is good quality, relatively cheap and can last a long time. He considers a bad purchase to be something that breaks down easily or is too expensive for what is given in return.

Following my interviews, I can definitely acknowledge that there is a big and diverse market for cyber-security. Many people are looking to protect private date and sensitive records from hackers or companies specifically targeted at stealing information. My interviewees all had similar answers for what they considered good and bad purchases. They want something that is relatively inexpensive, effective, good-quality and long-lasting. Another factor they all had in common was quality over aesthetics, when it comes to a security system. Depending on whether they are looking to purchase for themselves or for a large corporation, their answers on the method of purchase varied. In addition, the specific qualities they were looking for in a security system also varied based on where they worked and what they needed it for. In terms of alternative evaluation, purchase decision and post-purchase evaluation, I believe this segment took into account all the right factors when trying to boost their cyber-security. They all want bang for their buck and are interested in quality, rather than price or looks. 

Friday, 28 February 2020

Assignment 14A- Halfway Reflection


1)      Some of the behaviors that have enabled me to keep up with this course is to read ahead of what each assignment entails the week before. This allows me to plan and understand how much time I need to dedicate to each post. For instance, some assignments only call for a reflection, while others require reading an entire book or conducting a 5-10 minute interview with 5 people. Understanding what assignments require ahead of time, will allow you to plan and manage your time acutely. This will also mean that you won’t be stressed out about say reading an entire book the morning a post is due. Another behavior that has helped me keep up in the course is to make a planner. In college, we often have multiple assignments and classes to study for, so if we don’t plan a time in which to accomplish them, they can build up. By making a planner, I know exactly when everything is due and have designated time periods in which my sole focus is entrepreneurship.
2)      As I’m a junior whose trying to pursue both business and medicine, there have been many times in college when I’ve wanted to give up. Specifically, I almost reached a breaking point this semester because I was taking 15 credits, while simultaneously trying to study for the MCAT. What I learned was that if I pack my schedule so much, I wouldn’t be able to do well in either school or on the exam. I needed to pick one or the other and dedicate my focus to that. So, I decided to plan better so I’m not doing too much at once. I’m going to focus on school this semester, and worry about the MCAT in the summer. This will enable me perform better on both, without having a complete mental breakdown. What I learned from my experience this semester is that I definitely had tenacity to not give up entirely. I made the decision that was best for me and enable me to perform better in the long-run.
3)      Three Tips:
- Manage your time- Some assignments are very time-consuming, stay on top of due dates!
- Don’t be afraid to ask questions- If you don’t understand something, ask someone because its better to do an assignment correctly than investing your time in something that’s wrong.
KNOWLEDGE IS KEY BUT APPLICATION IS THE DOOR SEVAN BOMAR - Work Hard- The skills you build in this class will help you build an entrepreneurial mind frame for the future. So, don’t just take these assignments for granted, actually try to understand and utilize the tools you learn in everyday life. Apply what you learn in life!!