Biz Tech Final Guide
Empathy Map
- Collaborative visualization of who an end-user is - Used for shared understanding - Used for making decisions - Useful for understanding value propositions and how they relate to customer segments
competitor analysis
- Do a proper research on all the apps that exist for the same purpose as yours - What my competitor is doing well? - What are the shortcomings of my competitors? - What are they not doing at all?
Gamification
- Motivating customers to take certain actions to become engaged with your brand - Finding what motivates people to take these actions can be a challenge but the marketers who have cracked the engagement code have seen amazing results
Benefits of BMC
- Offers a straightforward way to create a business model - Can be used for both "ideating" and "prototyping" - Customer-focused - Easy to understand - Easy to communicate - Flexible
logic bomb
A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
Business Transactions
A business transaction always happens between, at least, two parties Buyer and seller, no business operates in isolation A Ledger is a system of records for a business transactions are always recorded in the ledger in the selling organization, a transaction removes assets from the ledger in the buying organization, a transaction adds assets onto the ledger A general ledger includes five main account types: assets, liabilities, income, expenses, and capital. The assets could be: Tangible - house, products, cash Intangible - mortgage, services, digital music/video
Generative AI-Demo
AI systems can now compose text, audio, and images to a sufficiently high standard that humans have a hard time telling the difference between synthetic and non-synthetic outputs for some constrained applications of the technology. That promises to generate a tremendous range of downstream applications of AI for both socially useful and less useful purposes
NFT
A non-fungible token (NFT) is a unit of data stored on a blockchain that represents a unique item Real-world physical items or digital assets Unlike bitcoin or another cryptocurrency, not mutually interchangeable, i.e., not fungible One bitcoin is indistinguishable from any other bitcoin and can be readily exchanged, but NFT is unique; it is a one-of- a-kind piece of code, stored and protected on the blockchain An NFT can represent anything that exists as or can be represented by a digital - e.g., ownership of a digital asset that resides in a digital wallet NFTs provide: A way to authenticate ownership - each owner of a NFT has a one-of-a-kind token for his or her copy of that piece of digital asset Permanency Blockchain recorded provenance
Blockchain Versus Bitcoin
BLOCKCHAIN A methodology Identity of members is known Permissioned network Transactions are secret or Permission viewing Virtual Signing Handles many types of assets Selective endorsement BITCOIN A blockchain application Anonymity is important Anyone can participate Transactions are viewable by all members of the network Based on Public-Private Keys A cryptocurrency Based on Proof of Work
FluidUI
Browser Based Wireframe and prototyping tool
Common Human Errors
Carelessness with Laptops Carelessness with Computing Devices Opening Questionable E-mail Careless Internet Surfing Poor Password Selection and Use Carelessness with One's Office Carelessness Using Unmanaged Devices Carelessness with Discarded Equipment Careless Monitoring of Environmental Hazards
Blockchain
Chain of blocks that contains information (e.g., transactions) Distributed ledger open to everyone Multiple parties (peers) share it by keeping an identical copy All participants must give approval to the new recording = new block Each block contains: Data Hash - unique cryptographic identifier = a fingerprint of a block The hash of the predecessor block New Block is concatenated with prior block Hashing and the proof-of-work make the blockchain secure Every recording uses private cryptographic key or digital signature The process is repeated over and over creating a 'block chain'
Generative AI LLM (Chat GPT)
Chat-based interface to GPT(Generative Pre-Trained Transformer) developed by OpenAI as an automated text generator Generative - uses AI to predict - and generate - the next word, one word at a time, based on what has come Pre-trained - based on much of the internet, Wikipedia, mullion of function books and fact-based references, laws, etc. Transformer - example of a "Deep Learning" neural network, Google's transformer architecture (2018) served as a foundation
Some tips for naming the app
Distinctive and memorable name, clear: say what your app does, short: under 11 characters, use words related to app's purpose
The New Ledger System
Every record on the ledger has a very secure, un-hackable key - Every record is stamped with the unique SEAL of approval - When the next record is written in the ledger, everything in the PRIOR record, including its content and the unique key, is encoded (hashed) and becomes a part of the current record key
Communication Controls
Firewalls, anti-malware systems, encryption, etc.
The old Ledger System
Fundamental way we store information Example: record of a house Problem in the ledger today that a record can be easily tampered with (record can be deleted, record can be modified, record can be added) Hence, a system of INTERMEDIARIES exists to VERIFY trust-worthiness of the ledger, and, ultimately, of the counterparties involved Title agencies, tile insurers, title attorneys Banks DMVs Credit agencies
Phase of Gartner Hype Cycle
Innovation Trigger, Peak of Inflated Interests, Trough of Disillusionment, slope of enlightenment, plateau of productivity
Why is information security a major area of concern today?
Interconnected, interdependent, wirelessly networked business environment Smaller, faster, cheaper computers & storage devices Decreasing skills required to be a computer hacker International organized crime taking over cybercrime Lack of management support
Trough of Disillusionment
Interest wanes as experiments and implementations fail to deliver. Producers of the technology shake out or fail. Investments continue only if the surviving providers improve their products to the satisfaction of early adopters.
Cost Stucture
Product costing but also activity based costing
Crowdfunding
Method for obtaining project funding, by soliciting contributions from a large group of people, and especially from an online community. Not new, dates back to the 18th century when writers and musicians gathered money from many investors to publish large pieces of work. It works because... Small donations from many people can raise a lot of money By tapping into your online social connections, you can reach a much broader audience in less time than traditional fundraising processes Promoted as a way of assisting small businesses and start-ups looking for investment capital to help get their business ventures off the ground. Congress recently passed the JOBS Act, which directs the (SEC) to create rules exempting crowdfunding from the securities registration laws.
Slope of Enlightenment
More instances of how the technology can benefit the enterprise start to crystallize and become more widely understood. Second- and third-generation products appear from technology providers. More enterprises fund pilots; conservative companies remain cautious
Designing and Testing a Wireframe
Organize before you develop your app, it's cheaper to fix at this stage. Build your design elements, (images and media, your logo, the design of buttons and screens, font, color schemes, animations, menus). You Need to test these wireframes.
SWOT
Strength and weakness are internal factors, like cash flow, and resource pool, opportunity and threats are external factors like competition and demand, analyze the resources at your disposal and how to utilize them efficiently
What CR do we want to establish and maintain with our target customers?
Self-Service, personal assistance, automated service, communities, co-creation
Gartner Hype Cycle
Separate hype from the real drivers of a technology's commercial promise Helps getting educated on an emerging technology within the context of the industry and individual appetite for risk. Should you make an early move? Taking risk could reap the rewards for early adoption. One small step from the LeadingEdgeto theBleeding Edge.
What Gap does the blockchain close?
The Trust Gap
Mobile Apps vs. Mobile Websites
Web Sites - Can be used on any phone with internet - Free (for the most part) - Need to use/open a browser Mobile Apps - Need to be installed - Device dependent - May cost money - May use phone features (GPS, etc.) - Do not fully require internet
Wix
Wix drag and drop editor makes it easy to create a professional website, beginner friendly, and scaleable
Unintentional Threats
acts performed without malicious intent that nevertheless represent a serious threat to information security
Information Security
all of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction.
back door
typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures
Customer Segments
who is the target market, mass market vs niche, single or multi-segments, multi-sided platforms
How to make design decisions
identify your user, distinguish target users of the app, differentiate and profile new users. common mistake is to guess the user's taste and preferences and make decisions on assumptions, this is where personalization comes in handy make different personas and empathy maps
Malware
malicious software: any software intentionally designed to cause damage to a computer, server, client, or computer network. It secretly acts against the interest of the computer user Virus Worms Trojan horses Ransomware Spyware Adware
F-shaped design pattern
people tend to read text from across the top of the page, then scan down to the left, of the page for any bullet points or sidebars, then across the page again
Key Resources-Most important assets required to run the business
physical, intellectual/intangible, human, financial
Gartner's Emerging Tech Roadmap
places over 100 disruptive technologies in six sectors categorized by enterprise value (size of a bubble) deployment risk (red-high, green-low) adoption timelines (light grey - soonest) It allows you to Calculate technology deployment risks Discover opportunities to bring high enterprise value technologies into your tech stack Benchmark deployment progress to your peers in midsize enterprises.
Physical Controls
prevent unauthorized individuals from gaining access to a company's facilities. Common physical controls include walls, doors, fencing, gates, locks, badges, guards, and alarm systems.
Access Controls
restrict unauthorized individuals from using information resources and involve two major functions: authentication and authorization.
Firewalls
systems that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network
Prompt Engineers
train AI chatbots to improve their responses.
Common App Features
Login/Authentication, menu of operations, navigation widgets, profile screens, settings screens, search
aesthetics
Aesthetics is not directly about usability, aesthetics is about how pretty it is. Elements of Aesthetics: Balance visual weight across screen, use consistency, avoid repetition, use contrast to emphasize differences, use standard color schema, readable and web friendly, use simple and logical navigation, use familiar design patter
Key Partnerships-can be based on simple contract, or a structured dedicated organization
Buyer-Supplier Relationship, strategic alliances with non-rivals, co-opetition-partnering with rivals
Distributed Denial of Service (DDoS)
An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.
Denial of Service (DoS)
An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function).
Generative Ai: Generative Algorithms
One way to think about Generative Algorithms is that they do the opposite. Instead of predicting a label given certain features, they attempt to predict features given a certain label. For example, the question a generative algorithm tries to answer is: "Assuming this email is spam, how likely are these features?" Another way to think about it is to distinguish discriminative from generative like this: Discriminative models learn the boundary between classes Generative models model the distribution of individual classes
Usability
The degree to which a system is easy to learn and efficient and satisfying to use, faster, more accurate, with greater satisfaction, focus on navigation, it should be easy for a user to use on any phone with internet, find your app, start your app, and recognize your app.
Phishing
fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.
Advice on wireframes
organize before developing your app, wireframe doesn't have to look exactly like the app, start with a basic sketch, if you have lots of logos and graphics on the wireframe you will bog it down, you can add detail after confident with the wireframe, its good to practice with it.
Authentication
(confirms the identity of the person requiring access) and restricts unauthorized individuals from using information resources (can be something the user is, has, does, or knows)
Application of generative AI
- Portrait of Edmond Belamy, a canvas measuring 27 ½ x 27 ½ in (700 x 700 mm.) in a gold frame that shows the smudged figure of what looks like an 18th century gentleman - The image was created by Obvious, a trio of 25-year-old French students whose goal is to "explain and democratize" AI through art. - Specifically, they designed an algorithm that referenced 15,000 portraits from various periods. The rumor has it that they used code by another artist and programmer: 19-year-old Robbie Barrat, a recent high school graduate who shared his algorithms online via an open-source license. - Initially valued between $7,000 and $10,000, it was sold for at Christi's for $432,500
Key Activities
- Problem solving - Production - Delivery - Network
How it works (Generative AI)
25-33b training sentences were extracted from 175b parameters (internet resources, books, Wikipedia) = "unsupervised learning" GPT-3 is a mathematical model trained to predict the next word in a sentence using the previous words • When we ask GPT-3 something ("prompt"), it either picks the most likely next word or samples a word from the table
Innovation Trigger
A potential technology breakthrough kicks things off. Early proof-of-concept stories and media interest trigger significant publicity. Often no usable products exist and commercial viability is unproven
Revenue Streams=Cash we Generate from each customer
Asset sale-transfer of ownership, usage fee, subscription, licensing, brokerage fee, advertising, consumer data
Cryptocurrency and blockchain
Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format Cryptocurrency is a digital currency that uses cryptography for security measures. Each user has both public and individual private keys. Operates independently of a central bank. Bitcoin is based on Blockchain methodology An unregulated shadow-currency Created as a decentralized digital currency exchange system to exchange digital currency without the banks as intermediaries, while keeping anonymity Resource intensive (requires Proof of Work consensus) Created in 2008 after the Global Financial crisis
blockchain technology
DISTRIBUTED: It is a distributed digital ledger technology Ledger keeps records of transaction, value, and ownership of assets Copies of recording (ledger) are kept in different databases CONSENSUS: Everyone (or a Regulator) must validate and approve the new transaction/block SECURED: Uses cryptography to process digital transactions or verifiable digital signature IMMUTABLE: Once a transaction is recorded into a block, a block can't be changed nor deleted PROVENANCE: Blocks must show connection to (fingerprint of) prior block, keeping a trail
Distribution Channels
Direct-sales force, online, own stores, indirect-partner stores,
Generative AI: Discriminative Algorithms
Discriminative Algorithms try to classify input data; that is, given the features of an instance of data, they predict a label or category to which that data belongs. They simply map features to labels. For example, given all the words in an email (the data instance), a discriminative algorithm could predict the probability that an email is spam given the words it contains. It does so by gathering words from the email (input), analyzing it, and assigning a label - "spam" or "not spam"
Peak of Inflated Expectations
Early publicity produces a number of success stories — often accompanied by scores of failures. Some companies take action; many do not.
value proposition
Economic Value, Social Value
Deliberate Threats
Espionage or trespass Information extortion Sabotage or vandalism Theft of equipment or information Identity theft Compromises to intellectual property Software attacks Alien software (adware/spyware) Supervisory control and data acquisition (SCADA) attacks Cyberterrorism and cyberwarfare
Reinforcement Learning
However, GPT-3 had a problem - it wasn't explicitly trained to • generate good answers to user questions They hired humans to answer 11,000 questions and write helpful, accurate and inoffensive answers for them They took 1,500 questions users have asked GPT-3 and had humans create good answers, then trained GPT-3 on these additional 12,500 parameters => "supervised learning." • However, this takes a long time and is expensive. A better solution was asking humans to RANK the answers others wrote. 31,000 additional answers were compiled Given a question and an answer, the Reward Model was built that provided a rating - a single number that indicates how good the answer is • And then, the model was trained to incorporate this into the answers ("reinforcement learning"), and GPT-3.5 was born, which was later trained to chat and maintain a conversation
Two areas that pose significant threats
Human Resources and Information Systems
Magic Machine (Hash Function)
If we send "4" the machine converts it to "dcbea". Nobody knows how it happens exactly, but This process is irreversible: you cannot get "4" as in output if you send "dcbea" as in input OUTPUT dcbea 94c8e 000ca 000ca INPUT The process is consistent: every time you send "4" - you 4 will get "dcbea" If you want to find out what you need to serve as input for the machine to give you 000ab, there is only ONE method to achieve this - trial-and- error, one number at a time Let's be optimistic - after 10,000 attempts we found our number - it is 72533
Plateau of Productivity
Mainstream adoption starts to take off. Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off.
Native or Hybrid Apps
Native app only supports on one platform meaning you need separate apps for different platforms, hybrid app works on different platforms alike, they involve more cost, and reduce quality of the user experience. If audience largely uses one platform, native app is suggested as native apps are faster and less prone to bugs
NFT Application
NFTs are cryptocurrency where each piece accompanies artwork or a video clip Therefore, in effect, you are purchasing an original work of art that is simply a digital artwork rather than a physical drawing. 2/16/2021, Christie's announced that it would offer it's first-ever purely digital blockchain artwork - selling a collage of Beeple's first 5,000 "Everydays," the digital drawings he had been creating since May 1, 2007. Bids started at just $100, but quickly skyrocketed into the millions, before selling for an astonishing $69 million— making Beeple not only the creator of the most expensive NFT art ever, but the third-most-expensive of all living artists, behind only Jeff Koons and David Hockney
Trojan Horse
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
Business Model Canvas (BMC)
The BM approach focuses on economic imperatives, not competitive positioning
Considerations of Crowdfunding
The best crowdfunding website will have social tools to assist in sharing your fundraiser on social media Make sure the website has Facebook and Twitter applications as well as an easy way to share via email Check to see if the people behind the website are accessible. Do they have email addresses, a live chat, a phone line, or all three? It is very important that you feel the website and the team behind it are honest, responsible, and legitimate Normal fees for personal fundraising sites range from 7% to 12%. Some organizations charge the credit card processing fees to the donor; others roll the fees into the organization service charges. Be smart Read the fine print. Get legal advice. There are many online websites that offer crowdfunding and the list of options is growing everyday. Each of these services has different guidelines and fees. Example All-or-nothing funding is a core part of KICKSTARTER If a project is successfully funded, they apply a 5% fee to the funds collected plus credit card processing fees of 3 to 5%
Z-shaped design pattern
When the eye scans from left to the top right, forming an imaginary horizontal line, then to the bottom left, and trails back across the right again, forming a second horizontal line
App Wireframes
Wireframes are digital sketches of apps or websites/pages, wireframes provide a series of buttons, pages, functions and other design functions
Authorization
determines which actions, rights, or privileges the person has, based on his or her verified identity