Thursday, October 23, 2008
Founders at Work - Part 2
Future of advertisement
Today was rare. I don't watch much TV. I spend a lot of time online to watch TV shows (and video clips) on Hulu, Veoh, and YouTube. Why? It's purely convenience. I can watch it anytime at anywhere whenever I want. I guess I could have TiVO, but I am cheap.
A few weeks ago, I attended Bay Area K group's technical seminar on IPTV, and I am not quite convinced whether IPTV will be the future. Unless there are programs that clearly take advantage of two-way communications, I don't see the need for IPTV.
Thursday, October 9, 2008
Founders at Work - Part 1
There are definite similarities between all these successful founders.
- Most of them were singles when they started companies.
- They all started early, mostly around college period and sometimes in high school.
- Because they started early, they were all inexperienced and naive. Yet, most of them got funding from VCs. That seems to contradict conventional belief that VCs bet on a jockey, not on a horse. Big difference? Working prototype. They all had products and prototype already working.
- Most of them had gone through some tough times during the life of the start-up.
- Their first idea rarely worked. Many have gone through multiple iteration of ideas to get it right.
- Most had good partners and co-founders that supported each other in tough times. They all persevered, and made it at the end.
- They all attributed a lot of their successes to luck. It's not that they didn't work hard and only waited for Lady Luck to smile at them. They worked really hard, and while things could have gone many different ways, some things just fell into place....by chance.
I haven't finished the book, but I have to wonder if I had given up my company way too early. There were many additional obstacles; like having to support the family and having no committed co-founder (my partner left in less than six months). Though, I don't regret having started a company. It was once-in-a-lifetime experience. Another thing the book said was that start-ups tend to require more than professional commitment from employees. People say you don't get in to business with friends, but start-ups do need friends because of its high emotional requirements.
Nevertheless, it's very interesting book. I wish I had read this book before I started my company.
Wednesday, October 8, 2008
Open, Closed and Whole Product
Mobile phones in general are now considered an essential item in one’s life. It’s hard to imagine what the world was like without them, not being able to connect to anyone at anytime from anywhere (even interrupting us at anytime). Most people nowadays cannot imagine what it was like before the Internet and mobile phones. Because of its portability and must-have status, the number of mobile phones vastly outnumbers any devices that connect to the Internet.
I can’t say for any other countries, but in US, smart phones are absolutely necessary in business because of its ability to access corporate emails and calendar. In fact, they are two major functions why millions of business users buy smart phones, which have become mandatory communications device for business users.
In addition to the vast volume of general mobile phones, smart phones are becoming more and more like small computers. With wide variety of applications available to download and install, new smart phone users enjoy the same freedom of choosing whichever application they’d like to use as those desktop users. As a rule of thumb, the technology advancement will continue and they may become as powerful as some laptops, as today’s laptops are as fast and powerful as desktop. It’s inevitable and just matter of time.
So, if you think about billions of laptop-like mobile devices with wide variety of Internet applications, any security professional will cringe. Infecting mobile devices with malicious code could result in devastating results. All the personal information stored on the laptop including address book and emails could be leaked. Someone could also tap into user’s location information through GPS and keep tracking the user for criminal purpose. Since they will become as powerful as some laptops, it’s entirely conceivable that some sort of P2P applications (good or bad) might be developed for mobile phones. As more advanced botnet uses encrypted P2P network rather than traditional IRC channels, the mobile botnet can be certainly created with P2P network as well.
Apple keeps tight control over applications developed for iPhone, but when the number of applications is increasing faster and faster, they won’t be able to keep the full control. However, restriction and control are not the answer. They will only limit innovations and may even kill the very technology and/or product it is trying to protect. Internet was able to flourish because it was open. While there are some parasites, the benefits of openness vastly outweigh negatives. There are numerous cases when open system/architecture triumphed over closed counterpart. Open system encourages competition, which in turn fosters innovations in the market. Then, how does one make money in such environment? It may not be easy, but it’s possible. Good example is Cisco. Most Cisco products are based on open standards, yet they command highest market share in most markets. Worse yet, they do not build the best or the fastest products in the industry. Slightly different, but similarly, Apple was able to come in to crowded MP3 player market and dominate in short period of time. There is no secret to make a MP3 player, as you can see in high number of MP3 manufacturers. How did Apple do it? Is it because it looks beautiful? Americans are quite practical folks. Knowledge of America might be limited to what they see on TV or movies for some, but most Americans are definitely not frivolous. It wasn’t because of its looks. Then, how did Apple succeed?
In marketing there is a concept of “Whole Product.” It’s not enough to win in the market with just main product. In order to complete user’s experience, you have to consider what user would go through from before the purchase to what afterwards. Apple iPod was successful because of iTune software and iTune store. In order to complete MP3 experience, a user would have to find a way to manage his music collection and a way to add more songs (either by ripping a CD or buying online). iTune software and store completed that, and they worked flawlessly with iPod. How about Cisco? Cisco’s “Whole Product” is Cisco product plus millions of professional service and technical support professionals either from Cisco or 3rd-party vendors. Cisco made it legitimate with its certification program so that their customers, if chose to seek outside help, can find quality professionals by checking their certificates. It’s this auxiliary knowledge base that is keeping Cisco in the top place. Because they are market leaders and have most customers, their position is reinforced by many other companies that build and offer additional auxiliary items/accessories and service for them such as cases, boom boxes, adapters for iPod or training centers, system/network integrators for Cisco.
So which way is right for mobile security? It’s a million dollar question, and also where incredibly attractive opportunity could be.
Danger of isolation
The release of Chrome solidifies the importance of web browser and decline of desktop in the future of computing. There is a new wave of computing revolution going on, and I am afraid
Since the birth of the Internet, Software-as-a-service (SaaS) model has been attempted (remember those Application Service Providers in the early 2000’s?), but it truly gained momentum with rush of web 2.0 sites and also wild success of mega Internet companies like Google, Amazon, eBay, and etc. Since these companies needed to have massive processing power and deal with tremendous amount of data, they were early (commercial) adopters of high-performance computing. They wanted to monetize their expertise in running scalable data centers, and that’s how (commercial) cloud computing was born. Both Google and Amazon let a company or individual to run their web applications in their data centers and they charge only for resources used. This is especially good for web 2.0 start-up companies who cannot afford to run their own scalable data centers. Current cloud computing service isn’t perfect as demonstrated by outages from both companies. But, you can bet this is where the future of computing is headed. In turn this is also pushing development of products specifically targeting high-performance data centers, and both larger companies such as Cisco and Juniper and many start-up companies are jumping in the bandwagon.
This is also exactly why desktop and subsequently operating system is losing its significance. In other words, they both are going back to their basics, as they were meant to be. There is no reason for bloated OS. Actually some will even argue that OS is really just the kernel and anything else is application. It’s a religious war that I don’t want to get into. Nevertheless, it’s clear that as desktop applications move to the Internet (or cloud or somewhere remote accessible by URL or IP address), web browser becomes the window to all the applications. It doesn’t matter whether you use Windows OS, MAC OS, or Linux OS, all you need is a web browser. There will be some specific desktop markets that always need more processing power such as gaming and intensive computer graphics, and they will become only small fraction of entire desktop market.
This whole trend got me thinking about how come
In essence, I think