The Startup Idea Matrix – The Mission – Medium

Wow, I love this structure and brainstorming approach. This isn’t a mission to fill the voids, but an exercise I challenge all Strategy, Product Leads, and Digital executives to partake in for their customer groups.

There is something magical about laying out the ideas … talking to customers .. seeing around the curve, and maybe simply creating a beautiful experience in your App, at your location, or with your teams on those long tail (future!) clients.

Build something great – Ship it and create an amazing customer experience. Full link to the above matrix on Medium.

Keep innovating – James DeLuccia

The Startup Idea Matrix

I generally think it is smart to have patience in finding an idea that pulls you in: a market or opportunity you can’t imagine not pursuing. Patience in the near-term will save you a lot of time in the long-term. However, I’ve found one way to find this idea is to gain broad exposure to different markets until a specific opportunity and mission stands out to you. Credit to Chris Dixon who showed me this format a few years ago.

Source: The Startup Idea Matrix – The Mission – Medium

This is how you make Twitter profitable and safe – results of strategic analysis

This is how you make Twitter profitable and safe

These past few years we have heard the troubles of Twitter. Despite a brilliant founder and team, they are just not hitting the metrics and social impact possible.

I have heard dozens of banter on how to solve it, but I think the simplest solution is to practice what is already working. An approach that gains revenue, limits trolls, and raises the quality of the network in general. This has the potential to double and triple the value of Twitter. It would also increase the customer experience too!

This analysis is based on a detailed financial review and exploratory canvas of options across the start-ups and established businesses. If you spend time in the start-up scene — Atlanta to Silicon Valley, you know the passion and value of such customer experiences. There is more to be done, but let’s remove the noise.

To make Twitter Profitable and safe ….

Charge for accounts.

Imagine if web domains didn’t require you to pay for them — how could you ever manage them and let alone allow free market forces to self correct to quality? Charging for accounts will ensure that those (news outlets, media stars, etc..) who are making revenue off of the platform pay … those who use it to draw insights and have conversations also benefit by paying for it. EVERY start-up that led with a freemium model converted elegantly to a pay model … unless they had a superior platform for advertising.

Twitter is not a platform — it is a messaging space.

Have a twist on this idea? An alternative approach? Share it! Let’s make a sustainable business that we have all benefited, but maybe lost some love due to the filth.

Source: This is how you make Twitter profitable and safe – Medium

How Google positioned it’s size and security as a strategic advantage

Google published an in-depth outline on their cybersecurity initiatives around the Google Cloud Platform. While not as public as Amazon’s Cloud control details, it is worth a quick review for startups and business technologists looking to expand their offerings across this platform.

One item that I thought was well described, and aligned with my recent Strategy Article published here on Creating Value, is how they position their size as a benefit to the consumer.

Specifically, Google articulates, and engineered their offerings to take advantage of their size and scale to be MORE secure and MORE responsive to customer activities. Reinforces their position as a leader and illuminates many of the ‘Good to Great‘ qualities espoused by Jim Collins.

How you design your next solutions can be cumulative advantage, if done strategically.

A global network with unique security benefits

Google’s IP data network consists of our own fiber, public fiber, and undersea cables.This allows us to deliver highly available and low latency services across the globe.

In other cloud services and on-premises solutions, customer data must make several journeys between devices, known as “hops,” across the public Internet. The number of hops depends on the distance between the customer’s ISP and the solution’s data center. Each additional hop introduces a new opportunity for data to be attacked or intercepted. Because it’s linked to most ISPs in the world, Google’s global network improves the security of data in transit by limiting hops across the public Internet.

Source: Google Security Whitepaper  |  Documentation  |  Google Cloud Platform

Technology — that which surrounds our lives, enhances it, and improves it

How much are we really aware as to how it IMPACTS and IMPROVES our lives, and how do we manage it in a way to deliver results? Well, that is something I have been chasing for the past 11 years, through experimentation, start-ups, advising start-ups, inventing, and writing books.

Yes, writing books. The most recent project I wrapped up moments ago was on parenting. First off, parenting is a deep and passionate topic of mine and others — both family caregivers and parents alike. Tackling this required me to truly leverage a few core talents that I have excelled at for years (you possess many of these traits and the others are dormant, I promise).

Specifically, talents around developing practical and elegant insights to highly complex situations (Einstein would be proud). These skills of pattern matching, observation, study, broad research domains, and experimentation brought a distinct set of skills to form concrete examples and ideas around parenting. I also was able to tap into and develop my artistic capabilities, and craft a beautiful book with rich visual examples to connect with the reader.

The exploration and experimentation for making a book though is found in the actual creation — the execution. Here are the vast areas where technology and diverse teaming were required to produce the book:

  • Drafting of the book using online only editors (Google Apps)
  • Setting up a rich universe and feedback system across 1,ooo+ individuals
  • Launching surveys across social media and direct to individual experts
  • Hiring international team members (Germany, Philippines, and Canada) to provide artistic, interior design, and exterior design services
  • Printing and field testing the book using on-demand printing systems
  • Creating a wholesale company account to pre-order
  • Developing a storyboard marketing plan using vast online management and execution tools

and much more!

It is striking to me the integration of social media, online instant-delivery tools (imagine using this technology to create an individually designed in-person experience), conventional online tools, and international coordination through support platforms that allows for scale and efficiency.

These past few months I have been blessed to be able to explore my curiosity in this space of parenting and create a manuscript that I hope will benefit many families. It also allowed me to sharpen my consumer engagement knowledge that I look forward to utilizing more in the future. A great lesson for me, and perhaps one you can draw upon, too.

James

Discovery how you can publish too: Book Publishing and Book Printing Solutions for Nonfiction and Fiction

Police seek Amazon Echo data in murder case (updated)

Always on technology, Amazon’s Echo device is only a single example of numerous devices in our lives that accomplish this marvel, is in the spotlight in a murder court case – “Police in Arkansas want to know if one of the gadgets overheard something that can help with a murder case. According to The Information, authorities in Bentonville issued a warrant for Amazon to hand over any audio or records from an Echo belonging to James Andrew Bates. Bates is set to go to trial for first-degree murder for the death of Victor Collins next year.”

Echo only captures audio and streams it to the cloud when the device hears the wake word “Alexa.” A ring on the top of the device turns blue to give a visual indication that audio is being recorded. Those clips, or “utterances” as the company calls them, are stored in the cloud until a customer deletes them either individually or all at once. When that’s done, the “utterances” are permanently deleted. What’s more, the microphones on an Echo device can be manually turned off at any time.

Source: Police seek Amazon Echo data in murder case (updated)

Of course, you must delete the utterances from them to be gone …

I love the application and possibility of these technologies. While this is a good query into privacy protections and safeguards, there is much advantage to these technologies. It’ll be good to have the privacy concerns settled as it will further open the door for greater uses – medical, education, early childhood support, hospitality (already being done at the Wynn in Vegas), and more.

Best,

James

Topics for deeper study from the Commission on Enhancing National Security released on 12/1/2016

A few sections that I feel strongly about and look forward to studying more, and hopefully helping teams work on generally.

 

This feels very aligned with themes and success patterns within the development advanced technology space. There is an art though to these metrics and I am interested on the philosophy, raw inputs, and weight placed upon the 1,000s of possibly collected metrics:

Action Item 5.3.3 OMB should integrate cybersecurity metrics with agency performance metrics, review these metrics biannually, and integrate metrics and associated performance with the annual budget process. (SHORT TERM)

The idea of creating consistency and similarity seems to have a possibility of weakening the resiliency of the currently structured components. In that variety of administration, build, procedure, and custom threat augmentation all weaken with consistency. This will be interesting to see based on historic events. Cost wise I see an advantage, resiliency I am hesitant:

Recommendation 5.1 The federal government should take advantage of its ability to share components of the information technology (IT) infrastructure by consolidating basic network operations.

Well this sounds absolutely identical to the initiative that Mudge and his wife have setup in Washington and they presented at DefCon, well done:

Action Item 3.1.1 To improve consumers’ purchasing decisions, an independent organization should develop the equivalent of a cybersecurity “nutritional label” for technology products and services— ideally linked to a rating system of understandable, impartial, third-party assessment that consumers will intuitively trust and understand. (SHORT AND MEDIUM TERM)

 

Maybe if we stopped stating roles and responsibilities to regular consumers of our technology and spoke to them in English, as I learned the hard way in my own Consumer ‘roles and responsibilities’ a part of How Not To Be Hacked:

Action Item 3.1.3 The FTC should convene consumer organizations and industry stakeholders in an initiative to develop a standard template for documents that inform consumers of their cybersecurity roles and responsibilities as citizens in the digital economy

More to follow … hoping there is more transparency around these results and the process to enhance our Nation’s future success and safety.

James

https://www.whitehouse.gov/sites/default/files/docs/cybersecurity_report.pdf

Commission recommends an oversight agency, COMMISSION ON ENHANCING NATIONAL CYBERSECURITY

As many know, the 100 page report (really only about 50 if you exclude the appendices) highlights a lot of findings to shore up the government’s cybersecurity posture. As I study the findings and actions, I will share highlights.

Action Item 5.5.2 Congress should consolidate cybersecurity and infrastructure protection functions under the oversight of a single federal agency, and ensure this agency has the appropriate capabilities and responsibilities to execute its mission. (SHORT TERM)

This is something that I and others have warned against. Not that it shouldn’t happen, but if private industry doesn’t shore up the cybersecurity issue this will become a legislated and enforced area of business and technology. There is a path for this to avoid legislation and oversight, but that may not be viable if we continue to have major citizen impacting issues.

Full report: https://www.whitehouse.gov/sites/default/files/docs/cybersecurity_report.pdf

Thoughts?

James