Newsletter
REAL HACKER NEWS
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO
No Result
View All Result
REAL HACKER NEWS
No Result
View All Result
Home REVIEWS

10 tips for de-risking hardware products

Real Hacker Staff by Real Hacker Staff
March 19, 2023
in REVIEWS
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


How to test and evaluate demand for hardware products before you crank up the factory

Manufacturing real-life, tangible objects that you can touch is often a lot riskier than developing software. Once you’ve created 10,000 thingamajigs, it’s far harder to make changes to them than in the software world, where you can push an update if you want to tweak something.

In the world of manufacturing, then, the question is: How can I make sure that I’m building the right thing for the right audience?

Last week, when I wrote about Prelaunch.com’s $1.5 million fundraise, I asked company founder Narek Vardanyan what he thinks are the biggest pitfalls in hardware development.

Measuring the right users

To truly understand what your customers want, Vardanyan recommends studying what your potential customers actually do, not what they say they are going to do.

In an ideal world, that means getting them to buy or at least put down a deposit, for your product. Real buying intent is more valuable than someone simply saying, “Yes, I would buy this thing.”

“You need to make decisions based on people’s actual behavior. You need to make sure that the data you’re tracking is coming from the right types of people,” Vardanyan said. “Working with people who are putting down money acts like a filter: You keep only the people who really want to risk their money. In other words, your potential customers.”



Source link

Related articles

Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

March 22, 2023
Three legacy Battlefield games will be removed from online stores in April

Three legacy Battlefield games will be removed from online stores in April

March 21, 2023
Tags: deriskingHardwareProductstips
Share76Tweet47

Related Posts

Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

by Real Hacker Staff
March 22, 2023
0

While LinkedIn is helpful for displaying people’s educational and professional achievements, there exists a world of self-taught tech talent whose...

Three legacy Battlefield games will be removed from online stores in April

Three legacy Battlefield games will be removed from online stores in April

by Real Hacker Staff
March 21, 2023
0

Artist's conception of EA taking aim at the digital storefronts hosting three legacy Battlefield games.Electronic Arts If you want to...

Daily Crunch: Bing allows users to generate images using ‘very latest DALL-E models’

Daily Crunch: Bing allows users to generate images using ‘very latest DALL-E models’

by Real Hacker Staff
March 21, 2023
0

To get a roundup of TechCrunch’s biggest and most important stories delivered to your inbox every day at 3 p.m....

Here’s the full analysis of newly uncovered genetic data on COVID’s origins

Here’s the full analysis of newly uncovered genetic data on COVID’s origins

by Real Hacker Staff
March 21, 2023
0

Enlarge / Security guards stand in front of the closed Huanan Seafood Wholesale Market in the city of Wuhan, in...

Newegg’s unique NAS configurator is a handy, but limited, shopping tool

Newegg’s unique NAS configurator is a handy, but limited, shopping tool

by Real Hacker Staff
March 21, 2023
0

Newegg has a quick and dirty way to pick a new NAS device and the drives that'll go in it....

Load More
  • Trending
  • Comments
  • Latest

eSIMs Will Transform the Way You Think About Mobile Data and Security

March 7, 2023

XMOS Launches XVF3800 High-Performance Voice Processor for Enterprise and Consumer Voice Conferencing Platforms

March 7, 2023

Sennheiser Starts Shipping EW-DX Digital Wireless Microphone Series

November 22, 2022

Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities

December 7, 2022

Hello world!

0
US Commodities Regulator Beefs Up Bitcoin Futures Review

US Commodities Regulator Beefs Up Bitcoin Futures Review

0
Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

Bitcoin Hits 2018 Low as Concerns Mount on Regulation, Viability

0
India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

India: Bitcoin Prices Drop As Media Misinterprets Gov’s Regulation Speech

0
Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

March 22, 2023
Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

March 22, 2023
ARRI Hi-5 SUP 2.0 – Newsshooter

ARRI Hi-5 SUP 2.0 – Newsshooter

March 22, 2023
Police raid on Russian human rights group draws condemnation | Human Rights News

Police raid on Russian human rights group draws condemnation | Human Rights News

March 21, 2023

Recent News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

Putin warns UK over depleted uranium tank shells for Ukraine | Nuclear Weapons News

March 22, 2023
Aspecta nabs .5M to build AI-vetted coder profiles

Aspecta nabs $3.5M to build AI-vetted coder profiles

March 22, 2023

Categories

  • APPLICATIONS
  • AUDIO
  • CAMERA
  • COMPUTERS
  • GAMING
  • LAPTOP
  • REVIEWS
  • SECURITY
  • SMARTPHONES
  • Uncategorized
REAL HACKER NEWS

We bring you the best news on Internet new gadgets hacking and technology from around the world

  • Contact
  • Cookie Privacy Policy
  • Terms and Conditions
  • Privacy Policy
  • Disclaimer
  • DMCA

© 2003 Real Hacker News

No Result
View All Result
  • Home
  • REVIEWS
  • SECURITY
  • GAMING
  • SMARTPHONES
  • CAMERA
  • COMPUTERS
    • LAPTOP
  • APPLICATIONS
  • AUDIO

© 2003 Real Hacker News

Go to mobile version