Reducing the implementation period of MVP

In the last publication, we learned how to remove everything unnecessary from our product. Today we will deal with the timing of the implementation of the MVP.

Some people think that an acceptable period for the implementation of MVP is up to 6 months, but my experience with the implementation of startups shows that it is optimal for up to 4 months, ideally up to 3. And testing a hypothesis (for example, using landing traffic) is up to 1.5 months.

Why is that? Everything is simple. On average, after 3-4 months, the team begins to burn out due to the lack of any results. I note that even the release of the first, albeit a raw, version of the MVP is a result that motivates the team.

Let's go back to our solution tracker, which appeared in the last publication. Let's start analyzing our functions.

The first is Internet acquiring for debiting money for a missed habit. The key question for analysis is: "How to implement the function in the shortest time?".

To do this, we need to choose an acquisition that has:

— the simplest in terms of SDK integration;

— fast legal registration.

Among the selected providers, we choose the one that has:

— minimum commissions;

— more opportunities to accept payments from different sources.

The logic is simple — at first, it makes no sense to expect a large influx of subscribers, so profit losses on acquiring commissions are minimal, but paying for additional developer time will be much more expensive than transaction costs.

Go through each MVP function in a similar way to minimize the implementation time.



About graphs, simply.

In this article, we will begin our acquaintance with graphs, get acquainted with the breadth-first search algorithm (BFS) and implement the graph in the Rust programming language.


What is the difference between outsourcing development and outstaffing an IT employee for development?

In this article we will understand what outsourcing and outstaff development are.


Meet the Pentest

We are beginning to consider one of the main methods of assessing the security of computer systems and networks for potential vulnerabilities - penetration testing


Testing an MVP concept

We will figure out how not to waste the budget on MVP development in vain


Incorrect estimation of the cost of IT contractor services

Today we will talk about the incorrect assessment of the cost of developing IT solutions. This pain is one of the main ones for enterprises and startups, including IT contractors themselves.


Introduction to Design Patterns in Software Development

In this article, we will begin to dive into the world of optimizing application architecture using design patterns.


OSI Model Levels

In this article, we will take a closer look at each of the levels of the OSI model


Documenting code in the Rust programming language

In this article, we will look at how documentation takes place in Rust and consider a very useful opportunity - writing tests through documentation.


Introduction to the OSI model

In this article we begin to consider the fundamental model of network interaction - OSI


CSS animation ripple

A simple example of how to implement ripple animation using HTML and CSS


From concept to MVP

In this article, you will learn, by example, how to move from a concept to an MVP without unnecessary complications in the functionality of the product


Introduction to writing the terms of references

The Terms of Reference are an important part of the development process. In this article, we will begin to dive into this issue.


Introduction to software development

Today, most companies are faced with IT development and often do not get what they want. In this article, we begin to dive into the process of creating IT solutions.


From idea to concept

In this publication, we will talk about how the idea differs from the concept. Let's do this with an example of a specific goal


Weighted graphs

In this article, we will get acquainted with weighted graphs, Dijkstra's algorithm, and its implementation in the Rust programming language.


Why does a VPN business need?

In this article, we will look at how you can secure access to enterprise cloud resources using a VPN