Skip to main content

标 题: 重发个我startup的经历

http://gengwg.blogspot.com/
我个人自己做过2次startup,都没成功,不过也没亏。
做startup很容易,要成功太难。
技术只是一个很微小的方面,最关键的是在于控场的那个人,

#1 有一个idea,1个月内出不了雏形,那基本就没戏,
可以说绝大多数人都是在这个阶段,我称为梦游阶段,
很不客气的说,大部分码农的startup都在这个阶段。
一激动写了3天,三天之后晾哪里不管了,
然后对外说起,他也做过startup。

#2 出了雏形后,控场的人开始进入,
找合适的用户群开始试用,修改,大概成型后开始做推广。

#3 推广到一定程度后,开始找投资,
找投资方面有个误区,很多人以为一定要找VC,
其实没这必要,刚开始规模没起来,完全可以找些私人投资,
人家也比较愿意投,你也比较好控制你的公司。
whatsapp一开始不就是找的同事投的钱,
这个时候就要考验你这个人的RP了,你如果平时做人不行,那就歇菜了。

再之后,我就没经验了,我只做到第3步,
然后竞争对手太强,fail掉一个,
产品和一些金融的法律冲突,fail掉一个。
现在正在搞第3个,希望可以成功。

btw,我有自己的金主,出了我自己花时间开发,
钱方面的开销有人出,也是我一个长期客户,比较信任我,
他和我达成的deal,就是无论我做什么,
软硬件hosting,license开销全部他来,比例方面他要5%。

他自己个人也做过一个startup,我帮他开发,我拿10%
后来广告费什么,他也投下去大概有30多万,但是还是没效果。

总而言之,技术的原因几乎可以忽略,
就好象刘备/张飞/关羽/猪狗亮的关系
主要就是那个控局的人,什么时候干什么事,
即使有控局的大神,还得看机遇,遇到曹操,也是一样歇菜。

startup爆发其实很难的,
不然这里就不是码农板块了,而是亿万富翁俱乐部了。
不过做做startup,肯定比自己单纯打工爽很多,
就算自己再打工,想事情看事情的方法也不一样了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...