Wednesday, 22 April 2020
Assignment 22A- Elevator Pitch No.3
Assignment
22A- Elevator Pitch No. 3
From my past pitch, I listened to the feedback I
received and tried to keep the good parts like inflection and tempo the same
and incorporate things I could improve on. For example, this time around I
worked on memorizing my pitch more effectively so that I don’t break eye
contact with the hypothetical audience at any point. From the feedback I
received, I understood that this eye contact helps with a clear delivery and
makes the audience feel like you’re venture seriously. People are more likely
to appreciate a speech that has been memorized, rather than having to watch
someone reading something off a paper. I also tried to include more specific
qualities of my business concept and why it is important to purchase. By
highlighting the dangers of the internet, I also hope I was more convincing
this time around. Lastly, I tried to improve on my energy and hand gestures to
go hand in hand with what I’m saying.
Tuesday, 21 April 2020
Assignment 21A- Reading Reflection No. 2
Assignment
21A- Reading Reflection No. 2
Book: The Art of Social
Media: Power Tips for Power Users, Guy
Kawasaki
In today’s day and age,
social media can really help propel a business and reach millions of potential
customers around the world. According to Kawasaki, excelling in social media is
critical in jumpstarting your business, making sure it can compete with similar
business, and increasing its growth potential. In order to excel in social
media, Kawasaki provides important tips in this book. These tips include
treating your social media with professionalism, creating content that your
audience wants to see and allowing for audience feedback and interaction.
According to Kawasaki, capitalizing on these tips will allow you to exploit the
opportunities social media offers. Treating your business on social media with
professionalism will attract potential customers and build trust, because your
audience will see that you are taking this venture seriously. This book really
incorporates a lot of the concepts we learned through this class. For instance,
as Kawasaki alludes to hard work and passion go hand in hand. You must put your
all into marketing your business on social media because this is the best way
for it to be noticed. Just like taught in this class, you must approach your
business from different angles and pour your all into it if you want it to be a
success.
In addition, the book
states the importance of creating not for yourself, but targeting your
audience. If you post things with a purpose and something that will appeal to
you audience, you will boost your follower count and increase your potential
revenue. In terms of keeping your audience engaged, this is also a very
powerful tool on social media. People are more likely to interact with a
business and purchase something if they feel like their voice is being heard. If
I had to design an exercise after reading this book, I would definitely incorporate
making a social media post on Instagram to promote your business. Although it
doesn’t have to be real, having practice in developing a social media platform
for your business and how to post about your product can really be helpful.
Something I learned from this book that really differed from my expectation was
that Kawasaki didn’t initially reach success off of social media. Instead, he
worked to promote Macintosh in its early development through speeches,
presentations and personal interactions. I believe these experiences really
helped him understand what customers are looking for, and translate this
knowledge onto social media.
Friday, 17 April 2020
Assignment 30A- Final Reflection
Assignment
30A- Final Reflection
Throughout this class, I’ve experienced many highs and
lows. There were many times where I underestimated the amount of work it would
actually take to develop a business concept. The assignments where we had to
interview people that would help contribute to our potential business was definitely
challenging, but so informative. Conducting market research and seeing how
customers would respond to your product is integral in understanding the scope
for your business. Out of all the experiences, however, I believe the most
formative experiences were the different elevator pitches we recorded. I can definitely
see the growth and progress I made between the first and third pitch. While it
pushed me out of my comfort zone, I think being able to talk about your product
and sell it a large audience is one of the most integral components of starting
a business. Even though I was only in front of a mirror, I could imagine giving
the same speech to a crowd of people. Although, this scared me I believe it was
great practice to get me ready for a similar situation in the future should I
choose to launch this type of business or another. Public speaking is never
easy, but as an entrepreneur it can be a great tool to increase your customer
base and future revenue. Therefore, I consider the elevator pitches the most
joyous experiences and the one that caused me the most challenges. I am most
proud of myself for putting myself out there and pushing myself by getting
through them. After this class, I definitely think more like an entrepreneur
and have developed an entrepreneur type mindset.
Although I wouldn’t go as to far as to call myself an
entrepreneur because I have no product or begun to market anything, but I can
see a change in how I think. I now consider elements like competition, resource
availability and marketing, rather than just coming up with a product that can
help people. I now go beyond, about how exactly I can reach an unmet need, tap
into unexpected markets, use social connections and exploit opportunities. One
recommendation I would make to students going down the same path is to be on
top of time management and take the assignments seriously. These assignments
are geared toward allowing you to generate a realistic business model and plan.
Using these exercises will only help you in the future as an entrepreneur. Time
management is also very important because some assignments require intensive
research or interviewing many people, which can take a while. In order to get
into the right mindset for this class, I’d recommend reading some of the books
on the reading list. These books can help encourage you to take the assignments
seriously and take your business model to another level.
Assignment 29A- Venture Concept No. 2
Assignment
29A- Venture Concept No. 2
As the world becomes increasingly online, with the
outbreak of the corona virus, I think people now more than ever are in the
market for a cybersecurity system that would provide effective protection.
Banking, shopping an even school is now done online. Protecting sensitive
information and private data is significantly more important in today’s day and
age, just because the amount of information we put on the internet now.
Although there are measures people can take, like sharing less on social media,
it is inevitable that Google and other websites will save your personal
information. Making sure there is a system in place to prevent this information
from getting into the wrong hands could help millions of people around the
world. I will use close social connections in the IT and cybersecurity field to
develop a cybersecurity system that has multiple checkpoints before it can be
accessed, as well as having firewall/antivirus protection. Firewall/antivirus
protection will prevent hackers from getting access to people’s private data,
or potentially infecting your computer so that all your data is stolen. Having
multiple and specific checkpoints will mean that potential invaders will need
more than just a simple password or birthday to access the system. I think the
window of opportunity for this business will only expand because everything is
moving online, however I think now is hot time. This is because with the coronavirus
outbreak, people now more than ever are spending the majority of their time
online, thereby increasing their risk if they don’t have adequate protection.
My product would initially be sold for less than
typical cybersecurity systems that cost thousands of dollars. I would be
willing to sell it for around $700 and have a discounted cost of $500 for
students and those in low-income markets. This will allow me to tap into
markets that also want to protect their online security, but don’t necessarily
have the funds to afford a cybersecurity program. These markets can help grow
my business and bring in more revenue for the future. Customers will be more inclined
to purchase my product because it will offer effective protection at nearly
half the cost as most cybersecurity systems. My most important resource in making
this venture a reality will be the close family connections I have in the
cybersecurity and IT field. Not only can they help develop my product and make
adjustments as technology improves, but they also have access to thousands of computers
and systems that can be used to test the product before it hits the market. The
next step in my venture will be to develop the product and test it on these
computers and large systems to make sure it is effective.
The feedback that I got from my previous venture
concept was very important because I learned I needed to get more specific for
my next venture concept. Therefore, I tried to incorporate specific elements of
my venture concept, like exactly how much it would cost, how it would work and
why it would be appealing to customers compared to other similar products.
While, I highlighted the benefits of having an effective cybersecurity system
in my last venture concept, I didn’t get into details as to how I would go
about in achieving this. So, in this venture concept, I made sure to address the
social connections I look forward to using in order to develop and test this
product. By incorporating how the firewall/antivirus system with multiple
checkpoints may help providing effective security, I hope I provided a better
picture for what I hope to accomplish.
Thursday, 16 April 2020
Assignment 28A- Your Exit Strategy
Assignment
28A- Your Exit Strategy
Since the world is becoming increasingly cyber, and my
business involves developing a cybersecurity system that can protect private
data, I think it will be a product in demand for a long time. Obviously, as new
technology emerges, the software and programming of the system will have to
adapt to reflect these changes. Since I project this product potentially helping
millions of people for a long time, I intend to stay with the business for
several decades and then retire. Despite this, I definitely plan on hiring
different people that can take over different sectors of the operation so that
I don’t have to concentrate on every little aspect. Having people that I can
trust and are from the cybersecurity field are going to be critical in the
success of this product. Since I have so many people in my family that are part
of the IT and cybersecurity field, I plan to delegate the operations side to
them. I would primarily focus on marketing and selling the product to different
types of consumers. Once I retire, I plan on giving this responsibility to
someone who is just as passionate, if not more, in the venture as me. I plan on
staying with the business for decades because I am really interested in helping
people protect their sensitive information. As someone who has experienced
being hacked, I am aware of the dangers and uncertainties that can exist
online. I’ve also had my credit card number stolen, which is actually becoming
common with a lot of people. I want to help other people like me, and those who
have experienced event worse intrusions.
Since everything is moving online, I believe the
market for an effective cybersecurity program will only expand. I hope to make
my product a success and help people for decades to come. My exit strategy has definitely
influenced my growth projections and use of resources. Since I am dealing with
social connections that I am very close with in my own family, and they have
resources to get this business started, I don’t initially plan on investing on
new resources. Obviously, once my product is launched I will have to invest in
additional resources to support the growing business. In addition, as a result
of staying with the business a long time I expect a higher growth rate than if
I passed the business to someone after 5 years. This is because there won’t be
an intermediary transition phase in which someone else has to be trained to
fill my position. With this transition, another individual may have trouble
familiarizing themselves with the operations, or relating to other members of
the team. So I definitely think if I stay on the project for a longer time, it
will help growth projections. From my experience, I’ll also know what works and
doesn’t and can implement various changes to make the business more successful.
Assignment 27A- Reading Reflection No. 3
Assignment 27A- Reading Reflection No.
3
Biography: Coco Chanel, Lisa Chaney
After reading about Coco Chanel I was
surprised to learn that she came from poverty. As such an iconic and prominent
fashion designer and trend setter in the 20th century, I would’ve
thought that she had connections in the industry or came from an affluent
family. However, as the book alludes to, her humble beginnings is probably why
so many people were able to relate with her and connect with her style. I was
also surprised to learn about her many affairs with prominent figures of the
time, as well as with a possible German spy. I liked how Chanel pushed
boundaries and didn’t let preconceived notions about how women should dress
stop her from innovating and creating new styles. In addition, I admired how
Chanel pushed for progression of women through her clothing. Although Chanel
experienced backlash for designing clothes that were considered not appropriate
for women at the time, she stuck with her convictions and didn’t let
conservatives stop her from creating. Instead, through this adversity she
continued to push for progression and even rebelled against typical standards.
Similar to how she overcame poverty, Chanel was able to escape from convention
through her passion.
Throughout
the book some competencies Chanel exhibited were resilience, hard work and
networking. Chanel was conscious of her humble background, coming from an
orphanage and working as a seamstress. Whenever she would face struggles later
in her life and as she started expanded her business, she would rely on how she
overcame hard times in the past to help her get through these struggles. The resilience
she showed proved to be key as she became a cultural and fashion icon in Paris
and throughout Europe. Another aspect that really helped Chanel was how she
networked with prominent men of her time to achieve status and connections to
help her grow her business. Whether she took them as lovers or friends, many of
them Arthur Capel helped her to launch her “little business.” One part of the
reading that confused me was the rumor that she potentially had a German Nazi
spy as a lover late in her life. I don’t know if this was a fact or something that
was circulated to discredit her and her work. From the reading, I gathered that
there were many people who weren’t a fan of Chanel’s progressive attitude, so I
can see why they would start this rumor. If I could ask Chanel two questions it
would be how did your early life impact your designs and ideals in fashion
later on? I would also be curious to know how her business was able to grow
during a time when the world faced two world wars. From everything I know about
Chanel through her biography, I definitely think Chanel viewed hard work was a
tool to exploit. I agree with this because although many people big dreams, not
everyone puts in the blood, sweat and tears required to make it a reality. Even
with people that work hard, they are often required to go above and beyond to
achieve their dreams.
Assignment 26A- Celebrating Failure
Assignment
26A-Celebrating Failure
This past semester, in addition to taking a heavy
course load, I thought I would also be able to study for the MCAT and take it
in April. Since I’m a junior and hope to apply to medical school this spring,
it was critical that I take the exam now and get a relatively good score. The
alternative to not taking it would mean that I would have to take it over the
summer and apply late in the cycle, or potentially take a gap year. I’m someone
who thinks they can do everything and likes to be involved in a lot of
activities. I definitely underestimated the amount of material on the exam and
how hard it would be. Along with school and my other activities, I just couldn’t
keep up with the rigorous hours required to study for the MCAT. My lack of
understanding and trying to do too much at once was exacerbated by the
coronavirus situation. Once I began taking practice tests and failing, I
realized I was nowhere close to the score I had imagined. I realized that I
would need to dedicate full time studying to just the MCAT and would most
likely have to take a gap year. While this failure was hard to accept, I knew
that I would do much better and have a better quality of life if I just tried
to do a few things at once. The fact that I was trying to do both school,
extracurricular activities and the MCAT at the same time meant that I wasn’t
able to give full focus and dedication to any one of these.
I definitely had to fail to realize that no matter how
hard you try there are just some things out of your control. You can’t force
things and try to do everything at once. Instead, you should work hard and do
as much as possible without sacrificing your health or relationships. Overall,
I think failure is one of the hardest things to accept and go through. Not only
does it take a hit on your confidence, but it can also cause you to feel
ashamed or less than. You could feel like a disappointment or like you let
other people/yourself down, but as long as you learn from your mistakes and
actively work to adapt and adjust to eventually achieve your goal, you are on
the right path. Failing to take the MCAT, and having to take a gap year, is definitely
disappointing and I always think if there was anything more I could’ve done to
make it work. However, what I realized is having this mindset is not going to
help me moving forward. I have to realize that I gave it my all, but was just
trying to do too much at once.
Overall, now I am proud of the hours and grind I
put in and know that it will help me in the future.
This class also helped me change my mindset and views
on failure because after reading/listening to stories of different entrepreneurs
and doing various exercises to develop a business concept, I realize that if
you ever want to accomplish something you have to dedicate full time and effort
to it. It isn’t possible to start up a business, and market it, if you are
doing a hundred other side projects. Dividing your workload and conquering one
thing at a time will yield better results. A positive mindset and resilience is
also key. For instance, if the Wright brothers gave up after their hundredth crashed
flight, who knows when the first plane would’ve been created. All in all, I
believe failure is an integral component to success and should be something we
all learn from so that we can adapt and become better.
Friday, 10 April 2020
Assignment 25A- What's Next
Assignment
25A- What’s Next
Existing Market:
I believe what’s next for my venture in the existing
market is for me to get together with the contacts I have in the IT and
cybersecurity field and build a cybersecurity system that offers comprehensive
protection. When I interviewed my uncle who works as a cybersecurity consultant
for AMBAC insurance and asked what should we do that we aren’t planning to do? He
stated we need to build a team that can actually be committed to this project.
No one person can accumulate all the data and software to come up with this
system. We need multiple people working on this project. Everyone on this team
will also be working other regular jobs, so it is important that we take that
into account with the time frame. When I asked him if customers were on the
market for an effective cybersecurity system, he said it is a great time to go
into this business. According to my uncle, as the world is becoming
increasingly cyber there is demand now more than ever for cyber protection.
Companies want to make sure that their private data, as well as sensitive information
about their consumers is protected.
The second person I interviewed was my cousin Pujan
who also works in cybersecurity. When I asked him what should we do that we
aren’t planning to do? He stated that there are new changes in technology and
new viruses that erupt daily. It is important that we as a team have enough
people to stay up-to-date on these adaptive threats. We need to evolve and
adjust our system with the same speed as hackers and those looking to commit
fraud. When I asked him what customers may want next out of a cybersecurity
system, he said people would definitely be interested in is a system that doesn’t
offer easy access. These days when everything about our lives is stored on the
internet, we don’t want this information to get into the wrong hands. As Pujan
alluded to a system that grants access to only those authorized to view
information is essential. There are many ways to circumvent this, but we need
to implement additional roadblocks for hackers. The third individual I
interviewed was my cousin Nidhi, who works as an attending resident at Mt.
Sinai in New York. When I asked her what should be doing that we aren’t, she
stated that it was important to analyze breaches that have occurred in hospital
systems and other large corporations. By analyzing this past data, you can
gather how leaks occurred and how to prevent similar mistakes in the future.
When I asked her what my customers might want next, she said a cybersecurity
system that won’t cost thousands of dollars. Average workers and students don’t
have that much money to prioritize towards cybersecurity. Providing something
that is effective, but affordable is key.
Following my interviews, I agree that I need to
deliver on creating a safe, comprehensive and relatively cheap product. Once I
am able to produce this sort of product, I think the next step for my venture to
grow in the existing market is to promote as much as possible. When an average
person is on the search for a new cyber security system, it isn’t always
evident what technology is the best, what sets one apart from another or even why
it is necessary in the first place. When my product comes out I am going to
reach out to the contacts I have in media, as well as social media influencers,
so that the masses can hear about it.
Being able to reach millions and make them understand
why it is unique and necessary could have a significant positive impact in
building my consumer base. Another thing that could help grow my existing
market is to make apparent the existing threats that exist online. I think in
today’s day and age we kind of just accept that everything is recorded by
Google and all our records saved. However, this can be very dangerous and past
examples of cyber theft and hacking should be brought to light in the media.
This increased circulation will heighten concern, and make people more aware of
the need for effective cybersecurity.
New Market
Another market that I also plan on targeting is the
poor portion of society. I understand that many people with economic struggles,
are not going to prioritize a cybersecurity system. Despite this, I am willing
to highlight all the reasons they should and offer breaks and discounts to all
those that subscribe to an annual membership. Having less funds means that you
have more to lose if fraud is committed at your expense. Online transactions
have a high chance of being monitored and tracked. This make poorer people just
as susceptible to credit card fraud, and other leaks that could cost them
thousands as everyone else. However, unlike everyone else, poorer people have
more to lose. To understand this new market, I first interviewed my friend
Aditya who is a third year college student at Carnegie Mellon. As a student who
is primarily paying for his own education, he barely has enough money to get a week’s
supply of groceries. When I asked him how my business may help someone like
him, he stated that if it was affordable enough it could help him incur any
fraudulent charges or issues. When I asked him what adaptations I should make
to appeal to people that may not have much money, he said it was important that
I keep the price point in mind. He said I could run promotions at special times
in the year, where people like him could potentially capitalize on some needed
protection.
The second person I interviewed was my friend Jenna,
she is going to dental school and like Aditya doesn’t have extra money to shell
out on products not needed for sustenance. When I asked her how my business may
help people like her, she stated that it could give her some comfort and security
in knowing her credit card information, identity and other sensitive
information is being protected. When I asked her the adaptations I should make
to appeal to someone like her, she again touched on the price. She stated if
the price was kept lower for those in graduate school, college or other
professional school, I might see a huge increase in subscriptions.
After interviewing this new market I was surprised to
see that even people with not a lot of money were still willing to purchase a
cybersecurity system for the right price. As long as my product was offered at
a substantial discount, they would be willing to designate some funds for peace
of mind. Both the people I interviewed acknowledged that if financial fraud or
other hacks were committed against them, it would cause a great deal of damage
and stress. Due to this sentiment, I believe the assumption I had that poorer
people have more to lose to be correct.
If someone only has $50 in their account and $30 is
fraudulently taken out, that person is going to have significant stress the
next day when they call their bank trying to get their money refunded. However,
with increased cyber security, the chances of such fraud occurring because of
an online transaction and greatly diminished. I think this market is as
attractive as my existing market because with diminished prices for students
and other struggling workers, I believe I will increase my consumer base. This
will eventually make me popular in places of diverse income and help me grow.
Thursday, 9 April 2020
Assignment 24A- Venture Concept No.1
I believe there is a great need for better
cybersecurity software. These days, everything we do from banking, to school,
to documenting of health history is conducted online. This poses a serious
threat that anyone with malicious intentions to commit fraud, or otherwise
steal sensitive information to sell to a third party, can easily do so.
Software and antivirus programs that currently exist on the market can be very
expensive and not provide effective coverage. We’re constantly hearing of leaks
of private information, social media accounts getting hacked and credit card fraud.
There is a significant unmet need to improve cyber security for individuals, as
well as companies, businesses and health care providers. No one wants their
identity, social security or other sensitive information being leaked to those
looking to commit transgressions with it. Private data should be kept private.
In terms of hospitals and health care providers, often times, patient files are
recorded on an online system. If this system does not have adequate protection,
health histories and other sensitive information could fall into the wrong
hands. These unfortunate people who have their information stolen and made
public could be susceptible to everything from wrongful employment
discrimination to termination. Since I have a lot of family members that work
in the health care as well as in hotels/motels, I know the online systems they
use to keep records isn’t that secure.
Although there are
standard security measures like a password and login, there isn’t much else
required to access the system. Once in, all that is often required is entry of
a birthdate to access a customer/patient file. There should be a system that
employs multiple checkpoints and runs various scans before access can be
granted to such private data. That’s where my new cybersecurity software system
comes in. I am proposing a system that incorporates multiple checkpoints, along
with antivirus/firewall protection that can secure our networks. Not only would
this save companies millions in reimbursement, but it would prevent the stress
and turmoil that could ensue from foreign invaders gaining access to your
sensitive data. There should be system that exists that requires much more than
a simple password and birthdate to access consumer’s file. I think the window
of opportunity for my product is huge considering most business transactions,
and record keeping is done online. With the outbreak of the coronavirus, everything
is moving online. Everybody wants to have a secure network to operate from and
be worry free that whatever they put into the cyber space isn’t stolen and used
for malicious purpose. Essentially, I am offering a cybersecurity system that
provides comprehensive protection from invaders by integrating a checkpoint system
with firewall/antivirus protection. The system will also have face recognition
with checkpoints of its own, so no unauthorized users will be able to access
sensitive information. In addition, my product would offer a holistic system so
that it can be used by businesses as different as hotels and hospitals.
Quality cybersecurity systems,
like those provided by Siemens and Norton, sell at an average of $1000 and
more. Since my system will have the benefit of being tried and tested and
created without much initial investment due to my connections in the industry,
I will try to sell it for half the price at $500. In addition, I will include a
package that if renewed annually, a discount of $50 will be included. Members
will also enjoy benefits by accumulating points for free scans and file cleanups.
I hope these measures will help me outcompete some leaders of the field. While
my innovation is a fairly new idea and hasn’t even begun to being developed, I
think once it does hit the market customers will be drawn to it. Customers will
see that it is much cheaper than some of the leading cyber security software’s
and will be tempted by its promise to offer comprehensive protection. In
addition, I will use my connections in advertising in the media to promote the
product as much as possible. Social media will also be a big platform of
promotion. The main selling point will be highlighting the threats that exist
on the internet. When it comes to cyber security, not much is marketed on tv,
radio or social media. The average person is unaware of the various software that
exist and the resources that make one company better than another. The more
they see a certain company’s cybersecurity advertisement or hear about its benefits,
they are more likely to look into it and talk about it with their close circle.
In the end, they will be likely to purchase our product and help spread word
about it along the way.
Other companies for
cybersecurity don’t really make advertising and branding a priority, as much as
they could. I feel like focusing on this aspect can really give my product some
edge. Another benefit of my product would be that it wouldn’t take up too much space
and be a simple download that doesn’t need any instore travel or hassle. There
will also be a support line so that people can get immediate help when trying
to set it up. Idealistically, my business would have over 1000 employees and we
would be able to dedicate a team for solely support/setup, another for updates
and any problem utilizing the system/ and another for marketing and promotion.
The base of my staff would be people in the IT and cybersecurity field, who are
trained to make changes as the world adapts to new security measures.
Like a real virus hackers
can adapt, so it is always necessary to stay up-to-date with the latest
technology and viruses that exist. For this reason, I believe my most important
resource will be the family connections I have in the IT and cybersecurity
field. Not only will they help me develop my cybersecurity product, but they
can help me test it on a large network. I believe for my venture the next step
will be talking to my family members in these fields and starting to develop a
product that can offer comprehensive protection with multiple checkpoints. Even
though no system is completely full proof we can try to get as close as possible.
In the next 5 years I hope to atleast have a product that delivers on this
promise and begin marketing it. Through social media and my connections on the
news I hope to engage as many into the topic of cybersecurity as possible. I
hope that this will increase interest and a potential consumer base. This first
venture will be my introduction into the business world. I will learn all the
dos and don’ts and realize how the corporate world is actually run. From this
point on, I will expand my businesses from the knowledge and experience I have
gathered. I’m sure I will make a lot of mistakes along the way, and hope to
learn from them as well.
Assignment 23A- Your Venture's Unfair Advantage
Assignment
23A- Your Venture’s Unfair Advantage
1) Contacts
in the cyber-security field that are in charge of protecting large networks and
companies.
This is a valuable resource because
these people can help me develop a product that is actually effective in
protecting people’s online data. I think this is a rare resource because not
many people can say that they have so many family members and close family
friends in the IT and cybersecurity field. Not only does this mean that they’d
be willing to help me without looking for much in return, but I would have
extremely qualified people working on the job. Their daily tasks entail
protecting their companies from online invaders, so they are aware of the
software needed, and the tricks hackers use to steal sensitive information. All
this knowledge combined means they could really help produce a product that is
effective in protecting sensitive records and data. I also believe this
resource is non-substitutable because the knowledge and experience these
individuals bring to the field is hard to replicate.
2) Access
to hospital/motel/hotel data for records and statistics on cybersecurity lapses
in the past.
This information can also give me
insight on the methods perpetrators may employ to hack or steal sensitive
information. I also have family that works within hospital administration and
run hotels/motels. This is both a valuable and somewhat rare resource. Not only
will I be able to increase my understanding on how stealing of customer information
has occurred in the past, I’ll know the current measures these places are
taking for online protection. Once, I understand this, when I create my product
I can make sure that it does much more and offers a wider range of protection
than what most hospitals/hotels/motels currently have in place. In addition,
should I want a place to test out my product, I can always try it out at one of
these places. Due to again having these connections, once again in my own
family I believe this resource is non-substitutable.
3) Laptops/computers
for testing
Having access to different types of
laptops and computers will be essential in testing my cybersecurity software.
The fact that my dad has access to thousands of different hp/mac/and windows
computers will really help me in terms of conducting trials. I think this is
quite a rare resource because not all startup cyber security programmers can
gain access to thousands of computers for trials without a payment or giving
something in return. I also think this resource is nonsubstituable because
there are no other resources that can compare to having access to many
different laptops/computers. In order to test the efficacy of my software
system I need to make sure it runs smooth on all types of networks and
computers.
4) Consumers
willing to try the product
Following my interviews, there were
some people I talked to who were already saying that once my product comes out
that I could test it on their company. I believe this resource is very valuable
because having a large company utilize my product will not only give me great
feedback, but potentially thousands of new customers should they like the
service. I don’t believe this resource is rare because many people can find
places ready to accept cybersecurity help for no initial charge. Despite this,
I think it is rare to have people already willing to say they’d try out a
software system before it is even released based on connections. Due to this, I
think this resource to a degree is nonsubstituable.
5) Connections
to people in news and radio that could help me market the product.
My best friend’s father works at both
NBC and MSNBC, which could really help me in marketing once my software is
developed and ready to be sold on the open market. This is a very valuable resource
because making your product more known and talked about is a great way to
attract customers. Even if the people that hear about it don’t buy it, if they
talk about it, like or share it that could really help spread the word. I
believe this resource is both rare and nonsubstituable because products may
take years of development, financial pushing and marketing before people start
to give it attention.
6) Social
media that can also help me promote the product.
Although I don’t have that big of a
following, I know if I am somehow able to market my product on Instagram,
tiktok etc. so that it reaches a broader audience, it will really get more
people talking about cybersecurity. I think this is an essential and rare
resource because the more people know about your product, the more customers
you are likely to attract. However, I think it is rare to get much notice on
social media, especially because there are so many users and content creators.
Getting endorsements or making a product go viral can really have a significant
impact on the growth of your business. I believe this resource to be
nonsubstituable because in today’s day and age more people obtain information
from social media than the news.
7) Freedom
to access mostly everything on the internet
It is a valuable resource to live in
a country that doesn’t really restrict internet use. We can access sites and
networks of various countries, and by doing so we can get introduced to their
online systems. If we become familiar with their systems, we can try to guess
how they may use various programs to hack into American computers and networks.
I don’t believe this is a very rare resource because a lot of other liberal
countries like Canada, UK and Australia exhibit limited censorship. I also don’t
think this resource is nonsubstitutable because there are ways around
censorship and restrictions in most countries.
8) Access
to advertisers
Learning from professional advertisers
in the media can be very valuable tool because teach me the best ways to push
my product. I can learn how to convey its necessity in every home and
corporation, why it is the best over competitors and how it will protect
millions of people from online invasion. Having professionals who have had
years of experience in advertising is both nonsubstituable and rare.
9) The news, to figure out creative methods
people have used to hack systems, and measures people can take to boost security.
Learning from previous leaks and
breaches of private data, gives us a great pool of information. This is a very
valuable resource because it allows us to see what the implemented protection
was at the time of breach, how hackers were able to get around the protection
and the resulting impact. Therefore, when we create our software we can ensure
that these mistakes are not made and additional reinforcement is added so
hackers are unable to access sensitive information. While I don’t think this resource
is rare because this information is accessible to everyone, I do believe it is
nonsubstituable because this pool information is critical in understanding the
mistakes of the past and not repeating them.
10) Energy
& Time
As a young student, still in college
I believe that energy and time is a valuable resource I have. Although its not
that rare because many other students my age could have similar ideas. I do
think my work ethic, resilience and drive will help me in this endeavor. I also
believe this resource is nonsubstituable because there is no replacement for
dedication and grind.
Ø I
think my top resource is having connections to people in the IT and
cybersecurity field. This is because they are the ones who can help me develop
my cybersecurity software, with multiple checkpoints and antivirus/firewall
protection. In addition, they can give me new ideas to implement into the system
because they know the latest trends and methods of attack in the cybersecurity
field. They also possess networks/and computers where this product can be
tested before it is marketed and released. Having these close connections is my
most valuable resource because without them my product wouldn’t be able to
become a reality.
Subscribe to:
Posts (Atom)

