Fundamentals: the Framework and its Main Building Blocks

Author(s):  
S MATHUR
2020 ◽  
pp. 104225871989941 ◽  
Author(s):  
Dean A. Shepherd ◽  
Marc Gruber

The lean startup framework is one of the most popular contributions in the practitioner-oriented entrepreneurship literature. This study seeks to generate new insights into how new ventures are started by describing the five main building blocks of the lean startup framework (business model, validated learning/customer development, minimum viable product, perseverance vs. pivoting, market-opportunity navigation), enriching the framework with existing research findings, and proposing promising research opportunities in a way that reduces the academic−practitioner divide. In so doing, we hope to enhance researchers’ understanding of the startup process; provide knowledge for educators; and, ultimately, improve the startup process for practitioners.


2004 ◽  
Vol 04 (03) ◽  
pp. 277-296 ◽  
Author(s):  
HANS CRAUEL ◽  
LUU HOANG DUC ◽  
STEFAN SIEGMUND

A generalization of the concepts of deterministic Morse theory to random dynamical systems is presented. Using the notions of attraction and repulsion in probability, the main building blocks of Morse theory such as attractor–repeller pairs, Morse sets, and the Morse decomposition are obtained for random dynamical systems.


Nanoscale ◽  
2016 ◽  
Vol 8 (33) ◽  
pp. 15101-15114 ◽  
Author(s):  
Theo G. M. van de Ven ◽  
Amir Sheikhi

Cellulose nanofibrils (left), the main building blocks of wood fibers, are chemically treated to fall apart from the amorphous regions and yield hairy nanocrystalline celluloses and modified cellulose biopolymers (right).


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Marika Arena ◽  
Giovanni Azzone ◽  
Giulia Piantoni

PurposeAlthough innovation ecosystems (IEs) are generally considered capable of creating shared value (SV), this potentiality has often been taken for granted and not deeply analysed, yet. As a result, in the literature, there is not a framework that defines the process of SV creation in IEs or which aspects should be considered for understanding it. Moving from these considerations, this paper aims to propose a conceptual model of how IEs can create SV, identifying the main building blocks of the process and the aspects that characterize these building blocks.Design/methodology/approachThe authors reviewed the literature on IEs and value creation over the last 15 years, by structurally analysing 120 articles. On the basis of such review, the authors identified main dimensions of analysis focusing on the conceptualization of SV in IEs.FindingsFirst, the authors developed a conceptual model relying on a process-based logic and framing the SV creation in terms of inputs, here intended as four key characteristics (actors, structure, governance and relations), internal processes (strategies and internal mechanisms) and outputs (the value created). Second, each element of value creation is explored, highlighting the main evidence emerging from prior studies in connection to each block.Originality/valueThis paper drives the identification of some relevant relationships that connect the characteristics of the IEs, the strategies and the internal mechanisms to the output of the process, i.e. the SV created.


2013 ◽  
Vol 8 (0) ◽  
pp. 3404052-3404052 ◽  
Author(s):  
Irina V. ALEKSANDROVA ◽  
Elena R. KORESHEVA ◽  
Eugeniy L. KOSHELEV ◽  
Igor E. OSIPOV

Author(s):  
Anna Leander

This article is an argument about why it is worth taking the trouble to work with feminist, new materialist approaches inspired by Haraway, Mol, Stengers and others, when studying IR questions. It introduces and exemplifies one specific analytical strategy for doing so, namely one of “composing collaborationist collages”, focusing first on the main building blocks of the approach and then on the (dis-)advantages of working with it. In terms of the building blocks, I underline that composing makes it possible to join the heterogeneous and unlikely, that collaging accentuates the scope for playing with heterogeneity and that collaborating is a necessary part of this process as a well as a helpful check on one’s positionality. I then proceed by focusing on the (dis-)advantages of composing collaborationist collages, making the arguments that this research strategy directs attention to (dis-)connections and to the temporal politics of emergence. It also requires a willingness to face the uncertainties associated with creative academic work. The article introduces composing collaborationist collages as a research strategy. It does so working with material from feminist new materialism, practice theories, the exhibition War Games featuring installations by Hito Steyerl and Martha Rosler and my own work on the politics of commercial security.


Author(s):  
Antonio Savoldi ◽  
Paolo Gubian

This chapter is aimed at introducing SIM and USIM card forensics, which pertains to the Small Scale Digital Device Forensics (SSDDF) (Harril, & Mislan, 2007) field. Particularly, we would like to pinpoint what follows. First, we will introduce the smart card world, giving a sufficiently detailed description regarding the main physical and logical main building blocks. Then we will give a general overview on the extraction of the standard part of the file system. Moreover, we will present an effective methodology to acquire all the observable memory content, that is, the whole set of files which represent the full file system of such devices. Finally, we will discuss some potential cases of data hiding at the file system level, presenting at the same time a detailed and useful procedure used by forensics practitioners to deal with such a problem.


2013 ◽  
Vol 5 (3) ◽  
pp. 44-60 ◽  
Author(s):  
Nardjes Bouchemal ◽  
Ramdane Maamri ◽  
Mohammed Chihoub

Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed information and services that are not under the control of a single entity, and introduce new security and privacy concerns. In fact, securing these systems requires protecting any element from every other. This paper proposes a mechanism for enhancing security and privacy while using agents in AmI environments, based on three main building blocks: verification, judgment and surveillance. Furthermore, the key idea is based on cooperation and collective decision.


Sign in / Sign up

Export Citation Format

Share Document