Machine learning

Aligning Founder Superpowers with Product Cycles

Watching the generative AI space shape up over the past several months has reaffirmed my belief that, as product cycles mature, different types of builders have leverage at different moments in the cycle. And, at this early stage in generative AI, technologists and product pickers will likely have the biggest impact on which companies emerge as winners.

Typically, technologists and product designers have the leverage early in a product cycle as new capabilities and product patterns emerge and stabilize. Technologists and product pickers are the kings in this stage because of the rapid feedback loop between new capabilities exposed by the technology and new compositions of those capabilities delivered to customers by product pickers. This is too soon for a purely GTM-oriented founder, as the underlying technology and product patterns have yet to stabilize; word of mouth is the biggest driver of customer adoption. This corresponds to what Carlota Perez would call (in Technological Revolutions and Financial Capital: The Dynamics of Bubbles and Golden Ages) the “installation phase” of a new technology, when exuberance drives rapid installation and adoption of new technologies, lead by tinkerers and technologists.

Later, as the product patterns commoditize and the goal is to maximize market share for products that are already working, marketing-oriented founders have the advantage. This is why GTM-oriented founders dominate markets like SaaS: The underlying enablers have stabilized and hardened, and there is a lot of competition (it’s crowded), so the battle shifts from the feature war to a GTM execution game. Finally, as the marketing patterns and best practices stabilize, and markets consolidate around a few winners, business development and corporate development leaders (at new companies and incumbents) have leverage.

These two cycles (marketing- and business-development-led) correspond to the “deployment” phase that Perez outlines, where new technologies are widely deployed throughout industry and society, delivering the benefits more widely than in the installation phase.

Source

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Les 7 menaces cyber les plus fréquentes en entreprise

Introduction La cybersécurité est devenue une priorité stratégique pour toutes les entreprises, grandes ou petites.…

2 jours ago

Cybersécurité : Vers une montée en compétence des établissements de santé grâce aux exercices de crise

Cybersécurité : les établissements de santé renforcent leur défense grâce aux exercices de crise Face…

2 semaines ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

2 semaines ago

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

2 semaines ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

2 semaines ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

2 semaines ago

This website uses cookies.