In marketing, a product is anything that can be offered to a market that might satisfy a want or need
|
|
January 2 · Issue #16 · View online
Email digest of dylanninin
|
|
In marketing, a product is anything that can be offered to a market that might satisfy a want or need. In retailing, products are called merchandise. In manufacturing, products are bought as raw materials and sold as finished goods. A service is another common product type. – Wikipedia
|
|
|
《少谈些主义,多做些需求》——微信公众微信号产品经理 邹剑波Kant 分享笔记(上)-Aaron-耿
不得不说Kant实在是太能说了,居然超过了半个多小时的原定分享时间。工作完加班到10点整理出6张word文档,还是没弄完,同时也为了较好的“用户体验(Kant文章里讲这是很Low的词)”先放上来部分,后面的明天继续。他这次分享主要分为三方面:思考需求,做需求 ,谈需求。那么这次整理的就是思考需求。Kant的演讲风格很是幽默,并且干货多的足够撑到你。 … … 2014年的老文,现在看仍然十分有意义。这是上篇,继续阅读 中篇, 下篇。
|
A Lean Approach To Product Validation – Smashing Magazine
One of the biggest risks of building a product is to build the wrong thing. You’ll pour months (even years) into building it, only to realize that you just can’t make it a success.
At Hanno, we see this happening time and time again. That’s why we’ve put together a Lean Validation Playbook. Avoid developing an idealistic product. It should be validated by the lean process, with four distinct stages:
- validate the problem
- validate the market
- validate the product
- validate willingness to pay
|
A Methodology for Retiring Products · neovintage
I did a quick search for “kill a product feature” in Google and noticed that only the top 6 results are about killing features. Most of those posts are spent paying lip service to the exercise with little guidance around how to do it. This signals one of two things for me. Either, product managers never kill anything or killing features is the least glamorous part of being a product manager. I’m inclined to think it’s the latter because in some ways it means that your original hypothesis for building the feature was incorrect and that can feel defeating. It doesn’t have to be that way. To do a sunset properly, you’ll need to determine if your feature is ready for retirement, plan your timelines and execute with empathy.
|
How to build software with no code | Hacking Revenue
A guide for starting successful online businesses without needing to write a single line of code. Or you can exclaim: “I JUST NEED A PROGRAMMER !”
|
|
A quick tutorial on implementing and debugging malloc, free, calloc, and realloc
This tutorial is going to assume that you know what pointers are, and that you know enough C to know that *ptr dereferences a pointer, ptr->foo means (*ptr).foo, that malloc is used to dynamically allocate space, and that you’re familiar with the concept of a linked list. For a basic intro to C, Pointers on C is one of my favorite books. If you want to look at all of this code at once, it’s available here. Learn by doing! You can write a malloc by yourself, and see how it works with existing programs.
|
|
Lesson 2: The Network Interface Card
Network interface cards (NICs) provide the interface between cables, discussed in the previous lesson, and computers. This lesson explores the many different types of cards and how their performance affects a network. It also discusses the various connectors used to connect the cards to the cables. After this lesson, you will be able to:
- Describe the role of the NIC in a network, including preparing, sending, and controlling data.
- Describe the configurable options for NICs.
- List the primary considerations for selecting a NIC.
- Describe at least two enhancements to NICs that will improve network performance.
|
|
An introduction to Redis data types and abstractions – Redis
Redis is not a plain key-value store, actually it is a data structures server, supporting different kind of values. What this means is that, while in traditional key-value stores you associated string keys to string values, in Redis the value is not limited to a simple string, but can also hold more complex data structures. The following is the list of all the data structures supported by Redis, which will be covered separately in this tutorial:
- Binary-safe strings
- Lists
- Sets
- Sorted sets
- Hashes
- Bit arrays
- HyperLogLogs
|
BLPOP – Redis
BLPOP is a blocking list pop primitive. It is the blocking version of LPOP because it blocks the connection when there are no elements to pop from any of the given lists. An element is popped from the head of the first list that is non-empty, with the given keys being checked in the order that they are given. Although it’s a blocking command, it has both blocking and non-blocking behavior. You can use blpop against a list as reliable queues or for event notification.
|
|
Backtracking explained - Moritz Lenz
Backtracking is the programmer’s swiss army knife: Most problems where you can’t find another solution for are solved by backtracking.
Therefore I want to describe how to do backtracking using simple examples. To put it short: backtracking means trying all possibilities, e.g. Trial and Error. Usually it works this way: When you search for a solution, you try a possibility, and if you are stuck, you try the next one. You repeat that until you found your solution.
|
|
胡适的三个主义 - 阮一峰的网络日志
我这里千言万语,只是要教人一个不受人惑的方法。被孔丘、朱熹牵着鼻子走,固然不算高明;被马克思、列宁、斯大林牵着鼻子走,也算不得好汉。我自己决不想牵着谁的鼻子走。我只希望尽我的微薄的能力,教我的少年朋友们学一点防身的本领,努力做一个不受人惑的人。 三个主义:实用主义,实验主义,自由主义。
|
Did you enjoy this issue?
|
|
|
|
If you don't want these updates anymore, please unsubscribe here.
If you were forwarded this newsletter and you like it, you can subscribe here.
|
|
|