Biz Tech Final Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Empathy Map

- Collaborative visualization of who an end-user is - Used for shared understanding - Used for making decisions - Useful for understanding value propositions and how they relate to customer segments

competitor analysis

- Do a proper research on all the apps that exist for the same purpose as yours - What my competitor is doing well? - What are the shortcomings of my competitors? - What are they not doing at all?

Gamification

- Motivating customers to take certain actions to become engaged with your brand - Finding what motivates people to take these actions can be a challenge but the marketers who have cracked the engagement code have seen amazing results

Benefits of BMC

- Offers a straightforward way to create a business model - Can be used for both "ideating" and "prototyping" - Customer-focused - Easy to understand - Easy to communicate - Flexible

logic bomb

A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

Business Transactions

A business transaction always happens between, at least, two parties Buyer and seller, no business operates in isolation A Ledger is a system of records for a business transactions are always recorded in the ledger in the selling organization, a transaction removes assets from the ledger in the buying organization, a transaction adds assets onto the ledger A general ledger includes five main account types: assets, liabilities, income, expenses, and capital. The assets could be: Tangible - house, products, cash Intangible - mortgage, services, digital music/video

Generative AI-Demo

AI systems can now compose text, audio, and images to a sufficiently high standard that humans have a hard time telling the difference between synthetic and non-synthetic outputs for some constrained applications of the technology. That promises to generate a tremendous range of downstream applications of AI for both socially useful and less useful purposes

NFT

A non-fungible token (NFT) is a unit of data stored on a blockchain that represents a unique item Real-world physical items or digital assets Unlike bitcoin or another cryptocurrency, not mutually interchangeable, i.e., not fungible One bitcoin is indistinguishable from any other bitcoin and can be readily exchanged, but NFT is unique; it is a one-of- a-kind piece of code, stored and protected on the blockchain An NFT can represent anything that exists as or can be represented by a digital - e.g., ownership of a digital asset that resides in a digital wallet NFTs provide: A way to authenticate ownership - each owner of a NFT has a one-of-a-kind token for his or her copy of that piece of digital asset Permanency Blockchain recorded provenance

Blockchain Versus Bitcoin

BLOCKCHAIN A methodology Identity of members is known Permissioned network Transactions are secret or Permission viewing Virtual Signing Handles many types of assets Selective endorsement BITCOIN A blockchain application Anonymity is important Anyone can participate Transactions are viewable by all members of the network Based on Public-Private Keys A cryptocurrency Based on Proof of Work

FluidUI

Browser Based Wireframe and prototyping tool

Common Human Errors

Carelessness with Laptops Carelessness with Computing Devices Opening Questionable E-mail Careless Internet Surfing Poor Password Selection and Use Carelessness with One's Office Carelessness Using Unmanaged Devices Carelessness with Discarded Equipment Careless Monitoring of Environmental Hazards

Blockchain

Chain of blocks that contains information (e.g., transactions) Distributed ledger open to everyone Multiple parties (peers) share it by keeping an identical copy All participants must give approval to the new recording = new block Each block contains: Data Hash - unique cryptographic identifier = a fingerprint of a block The hash of the predecessor block New Block is concatenated with prior block Hashing and the proof-of-work make the blockchain secure Every recording uses private cryptographic key or digital signature The process is repeated over and over creating a 'block chain'

Generative AI LLM (Chat GPT)

Chat-based interface to GPT(Generative Pre-Trained Transformer) developed by OpenAI as an automated text generator Generative - uses AI to predict - and generate - the next word, one word at a time, based on what has come Pre-trained - based on much of the internet, Wikipedia, mullion of function books and fact-based references, laws, etc. Transformer - example of a "Deep Learning" neural network, Google's transformer architecture (2018) served as a foundation

Some tips for naming the app

Distinctive and memorable name, clear: say what your app does, short: under 11 characters, use words related to app's purpose

The New Ledger System

Every record on the ledger has a very secure, un-hackable key - Every record is stamped with the unique SEAL of approval - When the next record is written in the ledger, everything in the PRIOR record, including its content and the unique key, is encoded (hashed) and becomes a part of the current record key

Communication Controls

Firewalls, anti-malware systems, encryption, etc.

The old Ledger System

Fundamental way we store information Example: record of a house Problem in the ledger today that a record can be easily tampered with (record can be deleted, record can be modified, record can be added) Hence, a system of INTERMEDIARIES exists to VERIFY trust-worthiness of the ledger, and, ultimately, of the counterparties involved Title agencies, tile insurers, title attorneys Banks DMVs Credit agencies

Phase of Gartner Hype Cycle

Innovation Trigger, Peak of Inflated Interests, Trough of Disillusionment, slope of enlightenment, plateau of productivity

Why is information security a major area of concern today?

Interconnected, interdependent, wirelessly networked business environment Smaller, faster, cheaper computers & storage devices Decreasing skills required to be a computer hacker International organized crime taking over cybercrime Lack of management support

Trough of Disillusionment

Interest wanes as experiments and implementations fail to deliver. Producers of the technology shake out or fail. Investments continue only if the surviving providers improve their products to the satisfaction of early adopters.

Cost Stucture

Product costing but also activity based costing

Crowdfunding

Method for obtaining project funding, by soliciting contributions from a large group of people, and especially from an online community. Not new, dates back to the 18th century when writers and musicians gathered money from many investors to publish large pieces of work. It works because... Small donations from many people can raise a lot of money By tapping into your online social connections, you can reach a much broader audience in less time than traditional fundraising processes Promoted as a way of assisting small businesses and start-ups looking for investment capital to help get their business ventures off the ground. Congress recently passed the JOBS Act, which directs the (SEC) to create rules exempting crowdfunding from the securities registration laws.

Slope of Enlightenment

More instances of how the technology can benefit the enterprise start to crystallize and become more widely understood. Second- and third-generation products appear from technology providers. More enterprises fund pilots; conservative companies remain cautious

Designing and Testing a Wireframe

Organize before you develop your app, it's cheaper to fix at this stage. Build your design elements, (images and media, your logo, the design of buttons and screens, font, color schemes, animations, menus). You Need to test these wireframes.

SWOT

Strength and weakness are internal factors, like cash flow, and resource pool, opportunity and threats are external factors like competition and demand, analyze the resources at your disposal and how to utilize them efficiently

What CR do we want to establish and maintain with our target customers?

Self-Service, personal assistance, automated service, communities, co-creation

Gartner Hype Cycle

Separate hype from the real drivers of a technology's commercial promise Helps getting educated on an emerging technology within the context of the industry and individual appetite for risk. Should you make an early move? Taking risk could reap the rewards for early adoption. One small step from the LeadingEdgeto theBleeding Edge.

What Gap does the blockchain close?

The Trust Gap

Mobile Apps vs. Mobile Websites

Web Sites - Can be used on any phone with internet - Free (for the most part) - Need to use/open a browser Mobile Apps - Need to be installed - Device dependent - May cost money - May use phone features (GPS, etc.) - Do not fully require internet

Wix

Wix drag and drop editor makes it easy to create a professional website, beginner friendly, and scaleable

Unintentional Threats

acts performed without malicious intent that nevertheless represent a serious threat to information security

Information Security

all of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction.

back door

typically a password, known only to the attacker, that allows the attacker to access the system without having to go through any security procedures

Customer Segments

who is the target market, mass market vs niche, single or multi-segments, multi-sided platforms

How to make design decisions

identify your user, distinguish target users of the app, differentiate and profile new users. common mistake is to guess the user's taste and preferences and make decisions on assumptions, this is where personalization comes in handy make different personas and empathy maps

Malware

malicious software: any software intentionally designed to cause damage to a computer, server, client, or computer network. It secretly acts against the interest of the computer user Virus Worms Trojan horses Ransomware Spyware Adware

F-shaped design pattern

people tend to read text from across the top of the page, then scan down to the left, of the page for any bullet points or sidebars, then across the page again

Key Resources-Most important assets required to run the business

physical, intellectual/intangible, human, financial

Gartner's Emerging Tech Roadmap

places over 100 disruptive technologies in six sectors categorized by enterprise value (size of a bubble) deployment risk (red-high, green-low) adoption timelines (light grey - soonest) It allows you to Calculate technology deployment risks Discover opportunities to bring high enterprise value technologies into your tech stack Benchmark deployment progress to your peers in midsize enterprises.

Physical Controls

prevent unauthorized individuals from gaining access to a company's facilities. Common physical controls include walls, doors, fencing, gates, locks, badges, guards, and alarm systems.

Access Controls

restrict unauthorized individuals from using information resources and involve two major functions: authentication and authorization.

Firewalls

systems that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network

Prompt Engineers

train AI chatbots to improve their responses.

Common App Features

Login/Authentication, menu of operations, navigation widgets, profile screens, settings screens, search

aesthetics

Aesthetics is not directly about usability, aesthetics is about how pretty it is. Elements of Aesthetics: Balance visual weight across screen, use consistency, avoid repetition, use contrast to emphasize differences, use standard color schema, readable and web friendly, use simple and logical navigation, use familiar design patter

Key Partnerships-can be based on simple contract, or a structured dedicated organization

Buyer-Supplier Relationship, strategic alliances with non-rivals, co-opetition-partnering with rivals

Distributed Denial of Service (DDoS)

An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.

Denial of Service (DoS)

An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes (ceases to function).

Generative Ai: Generative Algorithms

One way to think about Generative Algorithms is that they do the opposite. Instead of predicting a label given certain features, they attempt to predict features given a certain label. For example, the question a generative algorithm tries to answer is: "Assuming this email is spam, how likely are these features?" Another way to think about it is to distinguish discriminative from generative like this: Discriminative models learn the boundary between classes Generative models model the distribution of individual classes

Usability

The degree to which a system is easy to learn and efficient and satisfying to use, faster, more accurate, with greater satisfaction, focus on navigation, it should be easy for a user to use on any phone with internet, find your app, start your app, and recognize your app.

Phishing

fraudulent attempt to obtain sensitive information or data, by disguising oneself as a trustworthy entity in an electronic communication.

Advice on wireframes

organize before developing your app, wireframe doesn't have to look exactly like the app, start with a basic sketch, if you have lots of logos and graphics on the wireframe you will bog it down, you can add detail after confident with the wireframe, its good to practice with it.

Authentication

(confirms the identity of the person requiring access) and restricts unauthorized individuals from using information resources (can be something the user is, has, does, or knows)

Application of generative AI

- Portrait of Edmond Belamy, a canvas measuring 27 ½ x 27 ½ in (700 x 700 mm.) in a gold frame that shows the smudged figure of what looks like an 18th century gentleman - The image was created by Obvious, a trio of 25-year-old French students whose goal is to "explain and democratize" AI through art. - Specifically, they designed an algorithm that referenced 15,000 portraits from various periods. The rumor has it that they used code by another artist and programmer: 19-year-old Robbie Barrat, a recent high school graduate who shared his algorithms online via an open-source license. - Initially valued between $7,000 and $10,000, it was sold for at Christi's for $432,500

Key Activities

- Problem solving - Production - Delivery - Network

How it works (Generative AI)

25-33b training sentences were extracted from 175b parameters (internet resources, books, Wikipedia) = "unsupervised learning" GPT-3 is a mathematical model trained to predict the next word in a sentence using the previous words • When we ask GPT-3 something ("prompt"), it either picks the most likely next word or samples a word from the table

Innovation Trigger

A potential technology breakthrough kicks things off. Early proof-of-concept stories and media interest trigger significant publicity. Often no usable products exist and commercial viability is unproven

Revenue Streams=Cash we Generate from each customer

Asset sale-transfer of ownership, usage fee, subscription, licensing, brokerage fee, advertising, consumer data

Cryptocurrency and blockchain

Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format Cryptocurrency is a digital currency that uses cryptography for security measures. Each user has both public and individual private keys. Operates independently of a central bank. Bitcoin is based on Blockchain methodology An unregulated shadow-currency Created as a decentralized digital currency exchange system to exchange digital currency without the banks as intermediaries, while keeping anonymity Resource intensive (requires Proof of Work consensus) Created in 2008 after the Global Financial crisis

blockchain technology

DISTRIBUTED: It is a distributed digital ledger technology Ledger keeps records of transaction, value, and ownership of assets Copies of recording (ledger) are kept in different databases CONSENSUS: Everyone (or a Regulator) must validate and approve the new transaction/block SECURED: Uses cryptography to process digital transactions or verifiable digital signature IMMUTABLE: Once a transaction is recorded into a block, a block can't be changed nor deleted PROVENANCE: Blocks must show connection to (fingerprint of) prior block, keeping a trail

Distribution Channels

Direct-sales force, online, own stores, indirect-partner stores,

Generative AI: Discriminative Algorithms

Discriminative Algorithms try to classify input data; that is, given the features of an instance of data, they predict a label or category to which that data belongs. They simply map features to labels. For example, given all the words in an email (the data instance), a discriminative algorithm could predict the probability that an email is spam given the words it contains. It does so by gathering words from the email (input), analyzing it, and assigning a label - "spam" or "not spam"

Peak of Inflated Expectations

Early publicity produces a number of success stories — often accompanied by scores of failures. Some companies take action; many do not.

value proposition

Economic Value, Social Value

Deliberate Threats

Espionage or trespass Information extortion Sabotage or vandalism Theft of equipment or information Identity theft Compromises to intellectual property Software attacks Alien software (adware/spyware) Supervisory control and data acquisition (SCADA) attacks Cyberterrorism and cyberwarfare

Reinforcement Learning

However, GPT-3 had a problem - it wasn't explicitly trained to • generate good answers to user questions They hired humans to answer 11,000 questions and write helpful, accurate and inoffensive answers for them They took 1,500 questions users have asked GPT-3 and had humans create good answers, then trained GPT-3 on these additional 12,500 parameters => "supervised learning." • However, this takes a long time and is expensive. A better solution was asking humans to RANK the answers others wrote. 31,000 additional answers were compiled Given a question and an answer, the Reward Model was built that provided a rating - a single number that indicates how good the answer is • And then, the model was trained to incorporate this into the answers ("reinforcement learning"), and GPT-3.5 was born, which was later trained to chat and maintain a conversation

Two areas that pose significant threats

Human Resources and Information Systems

Magic Machine (Hash Function)

If we send "4" the machine converts it to "dcbea". Nobody knows how it happens exactly, but This process is irreversible: you cannot get "4" as in output if you send "dcbea" as in input OUTPUT dcbea 94c8e 000ca 000ca INPUT The process is consistent: every time you send "4" - you 4 will get "dcbea" If you want to find out what you need to serve as input for the machine to give you 000ab, there is only ONE method to achieve this - trial-and- error, one number at a time Let's be optimistic - after 10,000 attempts we found our number - it is 72533

Plateau of Productivity

Mainstream adoption starts to take off. Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off.

Native or Hybrid Apps

Native app only supports on one platform meaning you need separate apps for different platforms, hybrid app works on different platforms alike, they involve more cost, and reduce quality of the user experience. If audience largely uses one platform, native app is suggested as native apps are faster and less prone to bugs

NFT Application

NFTs are cryptocurrency where each piece accompanies artwork or a video clip Therefore, in effect, you are purchasing an original work of art that is simply a digital artwork rather than a physical drawing. 2/16/2021, Christie's announced that it would offer it's first-ever purely digital blockchain artwork - selling a collage of Beeple's first 5,000 "Everydays," the digital drawings he had been creating since May 1, 2007. Bids started at just $100, but quickly skyrocketed into the millions, before selling for an astonishing $69 million— making Beeple not only the creator of the most expensive NFT art ever, but the third-most-expensive of all living artists, behind only Jeff Koons and David Hockney

Trojan Horse

Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.

Business Model Canvas (BMC)

The BM approach focuses on economic imperatives, not competitive positioning

Considerations of Crowdfunding

The best crowdfunding website will have social tools to assist in sharing your fundraiser on social media Make sure the website has Facebook and Twitter applications as well as an easy way to share via email Check to see if the people behind the website are accessible. Do they have email addresses, a live chat, a phone line, or all three? It is very important that you feel the website and the team behind it are honest, responsible, and legitimate Normal fees for personal fundraising sites range from 7% to 12%. Some organizations charge the credit card processing fees to the donor; others roll the fees into the organization service charges. Be smart Read the fine print. Get legal advice. There are many online websites that offer crowdfunding and the list of options is growing everyday. Each of these services has different guidelines and fees. Example All-or-nothing funding is a core part of KICKSTARTER If a project is successfully funded, they apply a 5% fee to the funds collected plus credit card processing fees of 3 to 5%

Z-shaped design pattern

When the eye scans from left to the top right, forming an imaginary horizontal line, then to the bottom left, and trails back across the right again, forming a second horizontal line

App Wireframes

Wireframes are digital sketches of apps or websites/pages, wireframes provide a series of buttons, pages, functions and other design functions

Authorization

determines which actions, rights, or privileges the person has, based on his or her verified identity


Ensembles d'études connexes

Phlebotomy Essentials 6th edition. ALL quizzes, ALL ch. tests, GRADED work, NOT guesses. PLUS, the FULL NAHP study guide

View Set

Zoology- Animal Diversity - Chapter 6 Sponges Phylum Porifera, Exam 2

View Set

Chapter 7: Sexually Transmitted and Other Infections

View Set

American Government: Pre-Test: Semester B

View Set

Propiedad intelectual, propiedad industrial y derechos de autor.

View Set

Combo with "Micro Econ" and 3 others

View Set