Comments

  1. Lincoln,
    Thank you so much for this awesome blog post! I really thought it was excellent.
    Thanks,
    Linda

  2. Good perspective about the realities of hacking. Like anything, hacking is sexy but it really comes down to how it applies to taking a business forward in real and tangible ways. In other words, hacking for the sake of hacking doesn’t have much value.

  3. Hi Lincoln,

    I’d like to know more about “Exploit Organic Network Effects” it looks really interesting.
    I just have read “The Tipping Point” by Malcolm Gladwell. I love this book it’s really useful. He talk about 3 elements to reach a tipping point (persons, message and environment). I think what to propose with “Exploit Organic Network Effects” is the third element that Malcolm take in consideration. I have found very difficult to implement it and now reading your post I have realized that you are doing here. It will be great if you show an example explaining how you do it.
    Thanks in advanced.

    • It’s simpler than that, even. Organic Network Effects simply refers to those interactions your ideal customers (or the people that work there) have with other people both in real life or through other network-centric technologies. Once you really understand that, you can develop methods of “exploiting” that understanding.

      If you see how a user of an invoicing system interacts with their customer in real life, perhaps you can move that interaction into the product, thus exposing that 3rd party – with whom you have no prior relationship, but your customer does – to your product.

      This is commonplace now, but the idea of emailing a link to an invoice from an invoicing system to the customer, and requiring the customer to follow the link back to the SaaS invoicing system to take further action wasn’t always there and was absolutely the exploitation of existing organic network effects.

      Oh, and this lead to amazing inter-company virality for systems that likely would have never been considered for “viral expansion.” Tons of applications in Project Management, Time Tracking, Billing, Supply Chain, etc.

      I wrote a quick post that talks about this idea in a bit more detail:

      https://www.linkedin.com/today/post/article/20140604164554-7018284-infiltrate-their-network-for-good-not-evil

Trackbacks

  1. […] 5 Rules for Successful Growth Hacking <== read this first! […]

  2. […] 5 Rules for Successful Growth Hacking (sixteenventures.com) […]

  3. […] go a bit deeper on that subject, I wrote my 5 Rules for Successful Growth Hacking (not linkbait, I assure you), to give some insights into how I come up with that hypothesis to […]

  4. […] 5 Rules for Successful Growth Hacking […]

  5. […] of course, but I think the psychology and thinking that they used – and what goes into making Growth Hacking successful in general – apply across the […]

  6. […] I have to say that a lot of what I’ve already talked about regarding Growth Hacking can be used to – or will already – drive engagement and […]

  7. […] Originalmente publicada em: Sixteenventures […]

  8. […] now and everyone is – or has been at some point in the past – a Growth Hacker… there aren’t any actual rules. In fact, to me, the only rule in Growth Hacking is “no head shots” … don’t […]

  9. […] 5 Rules Of Successful Growth Hacking […]

  10. […] 5 Rules for Successful Growth Hacking […]

Speak Your Mind

*