<BackReducing the implementation period of MVP12/8/2022
In the last publication, we learned how to remove everything unnecessary from our product. Today we will deal with the timing of the implementation of the MVP.
Some people think that an acceptable period for the implementation of MVP is up to 6 months, but my experience with the implementation of startups shows that it is optimal for up to 4 months, ideally up to 3. And testing a hypothesis (for example, using landing traffic) is up to 1.5 months.
Why is that? Everything is simple. On average, after 3-4 months, the team begins to burn out due to the lack of any results. I note that even the release of the first, albeit a raw, version of the MVP is a result that motivates the team.
Let's go back to our solution tracker, which appeared in the last publication. Let's start analyzing our functions.
The first is Internet acquiring for debiting money for a missed habit. The key question for analysis is: "How to implement the function in the shortest time?".
To do this, we need to choose an acquisition that has:
— the simplest in terms of SDK integration;
— fast legal registration.
Among the selected providers, we choose the one that has:
— minimum commissions;
— more opportunities to accept payments from different sources.
The logic is simple — at first, it makes no sense to expect a large influx of subscribers, so profit losses on acquiring commissions are minimal, but paying for additional developer time will be much more expensive than transaction costs.
Go through each MVP function in a similar way to minimize the implementation time.
About graphs, simply.12/18/2022
In this article, we will begin our acquaintance with graphs, get acquainted with the breadth-first search algorithm (BFS) and implement the graph in the Rust programming language.
What is the difference between outsourcing development and outstaffing an IT employee for development?10/17/2022
In this article we will understand what outsourcing and outstaff development are.
Meet the Pentest8/22/2022
We are beginning to consider one of the main methods of assessing the security of computer systems and networks for potential vulnerabilities - penetration testing
Testing an MVP concept1/9/2023
We will figure out how not to waste the budget on MVP development in vain
Incorrect estimation of the cost of IT contractor services9/10/2022
Today we will talk about the incorrect assessment of the cost of developing IT solutions. This pain is one of the main ones for enterprises and startups, including IT contractors themselves.
Introduction to Design Patterns in Software Development10/3/2022
In this article, we will begin to dive into the world of optimizing application architecture using design patterns.
OSI Model Levels9/6/2022
In this article, we will take a closer look at each of the levels of the OSI model
Documenting code in the Rust programming language8/24/2022
In this article, we will look at how documentation takes place in Rust and consider a very useful opportunity - writing tests through documentation.
Introduction to the OSI model8/19/2022
In this article we begin to consider the fundamental model of network interaction - OSI
CSS animation ripple8/31/2022
A simple example of how to implement ripple animation using HTML and CSS
From concept to MVP11/18/2022
In this article, you will learn, by example, how to move from a concept to an MVP without unnecessary complications in the functionality of the product
Introduction to writing the terms of references1/31/2023
The Terms of Reference are an important part of the development process. In this article, we will begin to dive into this issue.
Introduction to software development10/10/2022
Today, most companies are faced with IT development and often do not get what they want. In this article, we begin to dive into the process of creating IT solutions.
From idea to concept10/27/2022
In this publication, we will talk about how the idea differs from the concept. Let's do this with an example of a specific goal
In this article, we will get acquainted with weighted graphs, Dijkstra's algorithm, and its implementation in the Rust programming language.
Why does a VPN business need?9/27/2022
In this article, we will look at how you can secure access to enterprise cloud resources using a VPN