Skip to main content

确定商业模式


创业的第一步:确定商业模式

很多职业经理人创业最大的问题就在于没有把创业当做一桩生意来看待,生意的核心就
是商业模式,你要生产什么,生产好了怎么推广销售?由这两个问题又衍生出一大堆问
题,比如你如何生产出你想要的高品质产品?你的代理商是否有能力做好推广?你如何建
立和维护平台关系?在以往的工作经验里,职业经理人习惯了按照上司的要求做事情,
丝毫不考虑做一件事情需要多少成本,公司是否支付得起费用,事情做好了能产生多少
收益,如果老板觉得费用太高而取消了计划,职业人士还会觉得老板小气,其实这是一
种高度不够,经验不足的具体表现。

CEO对商业模式的理解如果肤浅,那至少这次创业是一定会失败的。确定项目方向,确
定团队战斗力,确定代理商能力,确定好平台关系,一个CEO才能很好的告诉自己,我
应该做哪些事情,这些事情各自的权重是多少。我个人的看法是,一个初创团队的CEO
,应该把70%的时间花在内部事务,包括团队管理,产品制作等;30%的时间花在外围,
比如同行走访交换信息,平台关系公关,资本等。一开始我犯了很多错,很长一段时间
我都和同事们坐班到深夜,公司完全没有平台关系可言,实际上我是能够抽空走出去和
同行交流的。如果和圈子脱离了,你会失去很多信息,这些信息可以方便你做决策,还
可以帮助纠正目前可能错误的方向。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...