1. The document discusses the relationship between technologies and jobs, and provides a framework for mapping technologies to jobs.
2. It introduces the concept of "jobs-to-be-done" and analyzing customer jobs at different levels to find opportunities.
3. The document provides examples of how to deconstruct a technology, identify the functions it can perform, and then match it to relevant customer jobs where it may provide advantages over existing alternatives.
Faster Usability Testing in an Agile World presented at Agile2011Carol Smith
The sheer speed of an Agile project can be frightening to even the most experienced UX practitioner. This talk covers testing in short, quick, repetitive sessions, without sacrificing quality. The presentation covers strategies and techniques that can be used for speeding up traditional usability testing, on-site, remote and Rapid Iterative Testing and Evaluation (RITE) methods. Topics from planning through analysis, and ways to provide useful and usable recommendations to the team will be covered.
Emertxe Certified Embedded Professional (ECEP) is a flagship job-oriented training program offered by Emertxe. This slide deck has induction detail about course structure and delivery.
Faster Usability Testing in an Agile World presented at Agile2011Carol Smith
The sheer speed of an Agile project can be frightening to even the most experienced UX practitioner. This talk covers testing in short, quick, repetitive sessions, without sacrificing quality. The presentation covers strategies and techniques that can be used for speeding up traditional usability testing, on-site, remote and Rapid Iterative Testing and Evaluation (RITE) methods. Topics from planning through analysis, and ways to provide useful and usable recommendations to the team will be covered.
Emertxe Certified Embedded Professional (ECEP) is a flagship job-oriented training program offered by Emertxe. This slide deck has induction detail about course structure and delivery.
HCI LAB MANUAL
1
To understand the trouble of interacting with machines - Redesign interfaces of home
appliances.
2 Design a system based on user-centered approach.
3 Understand the principles of good screen design.
4 Redesign existing Graphical User Interface with screen complexity
5 Design Web User Interface based on Gestalt Theory
6 Implementation of Different Kinds of Menus
7 Implementation of Different Kinds of Windows
8 Design a system with proper guidelines for icons
Emertxe Certified Embedded Professional (ECEP) is a flagship program from Emertxe. This presentation talks about our continuous and holistic evaluation system that makes a student industry/job ready.
Paul Gerrard - Advancing Testing Using Axioms - EuroSTAR 2010TEST Huddle
EuroSTAR Software Testing Conference 2010 presentation on Advancing Testing Using Axioms by Paul Gerrard. See more at: http://conference.eurostarsoftwaretesting.com/past-presentations/
This talk sets out the thinking behind the Gerrard Consulting Business Story Method. The slides present background, an overview of the method and introduces the Testela Business tool that supports Gerrard Consulting services.
The One-Page Strategy & Execution (OPSE) Map: A New Way to Rapidly Achieve Ta...Rod King, Ph.D.
The world of personal and business development is awash with books about how to achieve goals. Yet, many people fail to achieve their goals using the suggested approaches and tools in those books as well as training courses. Why?
In this presentation, a new approach is presented, which is based on the art and science of how systems (and in particular, business model engines) work. King's Universal Business Model Equation (UBME) is presented for explaining why and how people and organizations fail to achieve their goals. UBME can also be used as a framework for setting, achieving, and managing goals using the simple but extremely versatile tool of the One-Page Strategy & Execution (OPSE) Map. Benefits of using the OPSE Map include the delight of rapidly achieving your goals as well as enormous savings in time, money, and energy in projects in the WE_Economy.
HCI LAB MANUAL
1
To understand the trouble of interacting with machines - Redesign interfaces of home
appliances.
2 Design a system based on user-centered approach.
3 Understand the principles of good screen design.
4 Redesign existing Graphical User Interface with screen complexity
5 Design Web User Interface based on Gestalt Theory
6 Implementation of Different Kinds of Menus
7 Implementation of Different Kinds of Windows
8 Design a system with proper guidelines for icons
Emertxe Certified Embedded Professional (ECEP) is a flagship program from Emertxe. This presentation talks about our continuous and holistic evaluation system that makes a student industry/job ready.
Paul Gerrard - Advancing Testing Using Axioms - EuroSTAR 2010TEST Huddle
EuroSTAR Software Testing Conference 2010 presentation on Advancing Testing Using Axioms by Paul Gerrard. See more at: http://conference.eurostarsoftwaretesting.com/past-presentations/
This talk sets out the thinking behind the Gerrard Consulting Business Story Method. The slides present background, an overview of the method and introduces the Testela Business tool that supports Gerrard Consulting services.
The One-Page Strategy & Execution (OPSE) Map: A New Way to Rapidly Achieve Ta...Rod King, Ph.D.
The world of personal and business development is awash with books about how to achieve goals. Yet, many people fail to achieve their goals using the suggested approaches and tools in those books as well as training courses. Why?
In this presentation, a new approach is presented, which is based on the art and science of how systems (and in particular, business model engines) work. King's Universal Business Model Equation (UBME) is presented for explaining why and how people and organizations fail to achieve their goals. UBME can also be used as a framework for setting, achieving, and managing goals using the simple but extremely versatile tool of the One-Page Strategy & Execution (OPSE) Map. Benefits of using the OPSE Map include the delight of rapidly achieving your goals as well as enormous savings in time, money, and energy in projects in the WE_Economy.
In the Jobs to Be Done space, I assume from my research that Anthony Ulwick, author of What Customers Want, is the originator of the thought, but Clayton Christensen has helped popularized the concept. On this theory though, I am staying with Ulwick's work and have used it numerous times. It works! It was not till several months ago that I actually finally created a mind map of the process. This is my rendition of it.
Generating opportunity maps with customer jobs to-be-doneHutch Carpenter
Outlines a method for soliciting your customers' jobs-to-be-done. These customer insights then become an opportunity map for targeting high impact innovation.
Explore Microsoft's Team Data Science Process, an agile, iterative data science methodology to deliver predictive analytics solutions and intelligent applications efficiently
Learn best practices for managing and creating value from data science projects
Brief introduction to Session-Based Test Management and to how Exploratory Testing is understood and approached under the influence of the Context-Driven Testing movement.
Usability Primer - for Alberta Municipal Webmasters Working GroupNormanMendoza
Presentation provided on December 1, 2006. References:
“A Practical Guide to Usability Testing” by Joseph S. Dumas and Janice C. Redish
The Elements of User Experience, diagram by Jesse James Garrett
Michael Bolton - Two Futures of Software TestingTEST Huddle
EuroSTAR Software Testing Conference 2008 presentation on Two Futures of Software Testing by Michael Bolton. See more at conferences.eurostarsoftwaretesting.com/past-presentations/
A brief introduction to Enterprise and Industrial UXLarry Burks
Presented for the Albany UX Meetup on Oct 4, 2016 at GE Global Research Center in Niskayuna, NY.
EUX is different from consumer focused UX. My observations on practicing EUX and hiring EUX professionals.
Similar to Tech connect spring 2014 technology to job mapping v2 (20)
An overview of why technology commercialization is important for those undertaking research in universities - insights into why the current process is broken and some insights into new apporaches.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. Technology vs. Jobs
• What is a ‘Technology’?
– “a manner of accomplishing a task especially using technical
processes, methods, or knowledge”
• can [usually] accomplish multiple tasks
• accomplishes each of these task in different or special ways
• The way tech. accomplishes tasks can be a strength or not
– Indeed technologies are frequently commercialized for other
unanticipated applications
Technology Original Application Major Application
Botox Treat Strabismus Wrinkle Reduction
Viagra Heart Drug Impotence
NASA Algae Oxygenation Baby Formula
3. Technology vs. Jobs
• What is a ‘Job’?
– Customers hire products or services to get a job done
– Jobs can be simple single step tasks or quite complex processes
– This is not what they do but what they are trying to accomplish
– Recognizing underlying goals helps you better understand the job
Hired Product / Service Job Underlying Need or Ultimate Goal
MS Word Write a document Organize / communicate thoughts
Scalpel Cut soft tissue Separate things or access somewhere
Razor or Barber Shave / Remove hair Want to look presentable. Maybe relax?
Microwave dinner, order
fast food, fine dining
Eat supper Sustenance? Have Fun? Maintain health?
Impress someone?
Heart Monitor Track Vitals Reduce complications during surgery
4. Jobs-to-be-Done
• Fast food place wanted to sell more milkshakes
• Innovations based on customer feedback did little
• So they observed…
• Many milkshakes were bought in morning…
• What do people hire a milkshake to do?
– Milkshakes…
• keep you busy for a while during a boring drive
• fill you up all morning
• and can be consumed with one hand while driving
– Alternatives include coffee, banana, donut, bagel, etc… but
also radio stations, CB talk, mobile phone, etc…
5. One secret to being
creative is being able
to smoothly move
between these
levels of analysis and
abstractness
Other alternatives
usually exist that can
also be used to
accomplish the job
That technology or capability can
usually also be applied to accomplish
[other] tasks relevant to other jobs
Products / Services vs.
Technologies & Jobs
Product /
Service
Customer
Job
Technology
/ Capability
A product or service is
built / delivered by
applying some
technologies or
capabilities to do a
customer job
Underlying
technologies may be
unique or common
and the organizations
ability to deliver that
technology / capability
may be strong or weak
6. This could be used for
many other jobs – e.g.,
letting people log / check
in at travel destinations in
car navigation system
Many apps have no
interesting or unique
underlying technology
Products / Services vs.
Technologies & Jobs
Fabergé Big Egg
Hunt Mobile App
Entertainment
/ Win Prizes /
Compete with
Friends
Beacon & GPS
Enabled
hyper-local
interactivity
7. TechConnect Tech’s
• Some Specific Technologies
– Early to late stage
– Temple and External (IEEE, GPSEG, NASA)
• Some Products / Services
– We will first separate underlying technologies / capabilities
from the product / service
– Earlier stage may simply be combining multiple established
technologies or processes in novel ways
• Some Capability / Knowledge Sets
– A set of capabilities, knowledge, or even access to scarce
resources provides a similar exploration opportunity
– Applies for individuals as well as organizations
8. Mapping Tech. to Jobs
• First Deconstruct Technology
– What functions or tasks can the technology accomplish?
– Under what conditions can it accomplish these things?
(include other unique / interesting aspects of how it does things)
– In what instances are these strengths / when might this be good?
(also when might this seem like a weakness or seem bad)
• Second Construct Relevant Jobs
– What customer jobs require these functions or tasks?
(e.g., what are situations when these tasks are useful)
– Which jobs are currently unmet and which have alternative?
(also identify alternatives or competitors when they exist)
– What are the advantages of this technology in each job?
(consider the complete process within the job and the
consumption chain for this product / service vs. alternatives)
9. Mapping T2J Example
• Technology Example
– Engineering solution to rapidly collect air samples on a rocket
during ascent using medical style syringe + membrane closure.
• Functions / Tasks?
– Collects air* samples (Open Question: Does it only sample air?)
• Conditions / unique or interesting aspects of tech?
– Can collect samples on a rapidly moving vehicle
– Could collect samples if the medium to be tested is moving
– Samples collected over time (and linked to time collected)
– Sample collection and analysis / testing steps are separated
– Requires multiple canisters for collection
10. Mapping T2J Example
• When are aspects a strength / weakness?
– Strength:
• When changing conditions must be measured
• When your business model is linked to selling canisters
• When testing / analytical equipment is expensive
– Weakness:
• When you need immediate results (act fast on results)
• When PPM is too low to be accurately captured in canister
– Open Questions:
• PPM threshold and correspondence to container volume
• What about alternative version w/ filter style testing that
changes filters and stores them with time stamp
11. Mapping T2J Example
• What customer jobs require these tasks?
– Pollution Monitoring (Industrial / Factories)
– Air Quality Monitoring (Cities / Regions)
– Hospital-based outbreak tracking (maybe w/ mobile robotic samplers)
– Drone based applications for air sampling over large regions
• Which jobs are unmet and what are alternatives?
– Pollution and air quality monitoring solutions exist
– Existing solutions seem to combine gathering and testing
– Unclear if there are any solutions for hospital application
– Unclear if other applications link sample to time / place
• What are advantages of this technology?
– Existing solutions seem to combine gathering and testing
– Common solutions utilize a filter to catch contaminants
– This works to detect small amounts but cannot track time
– If testing equipment is expensive this may reduce cost
12. Exercise Process Advice
• Ask / reframe question to get the group thinking
– Question assumptions constantly
– Don’t limit statements / claims unnecessarily
• No Judgment / Don’t Filter
– Write down anything that seems relevant
(inc. things others say as well as your own thoughts)
– Find a spot to place every post-it on the template
(if you are not sure put it on the border near where it might go)
– Make sure to identify unanswered questions as you go
– It’s ok to go back to earlier sections to add more ideas
• Post-It Notes
– Write one idea per post-it
– Try to write legibly
13. • Recognizes a universal process in all jobs…
1. Define goals for job
2. Identify / locate inputs
3. Prepare inputs & environ.
4. Confirm everything’s ready
5. Execute job
6. Monitor results
7. Modify process
8. Conclude job
Pre-execution Steps Post-execution Steps
Anatomy of a Customer Job
This is one secret for identifying and
creating advantages or differentiation
from alternatives
14. Customer-Centered
Innovation Map
• Job Level Opportunities
– Can the job be executed in a more efficient or effective sequence?
– Do some customers struggle more with executing the job than
others (for instance, novices versus experts, older versus younger?)
– What struggles or inconveniences do customers experience because
they must rely on multiple solutions to get the job done?
– Is it possible to eliminate the need for particular inputs or outputs
from the job?
– Is it necessary that the customers execute all steps for which they are
currently responsible? Can the burden be automated or shifted to
someone else?
– How many trends affect the way the job is executed in the future?
– In what contexts do customers most struggle with executing the job
today? Where else or when else might customers want to execute
the job?
15. Customer-Centered
Innovation Map
• Step / Task Level Opportunities
– What causes variability (or unreliability) in executing this step?
What causes execution to go off track?
– Do some customers struggle more than others with this step?
– What does this step’s ideal output look like (and in what ways is
the current output less than ideal?)
– Is this step more difficult to execute successfully in some contexts
than others?
– What are the biggest drawbacks of current solutions used to
execute this step?
– What makes executing this step time-consuming or
inconvenient?
16. Prioritizing JTBD’s
• Prioritizing JTBDs is a function of…
– how important the Job / Need is to customers
– how satisfied customers are with existing solutions (alternatives)
• Anything is better than nothing (unmet needs)
– This is true for everything from early transistor radios to cancer
treatments
• Alternatives usually exist…
– Remember identifying alternatives is about recognizing anything
that can do the same job
• However, alternatives may do different jobs
– Look back at the special aspects of how the technology
accomplishes the tasks to identify potential advantages
17. Mapping the
Consumption Chain
• To identify ancillary competitive advantages answer these
questions about alternative technology & your own…
– How do customers become aware of / find / select it?
– How do they order and pay for it and how is it delivered?
– How is it installed / started?
– How is it stored or moved around?
– How is it returned, exchanged, repaired, or serviced?
– How is it disposed of?