business-product-leadership
Business & Product Leadership
This skill bridges the gap between Business Strategy and Technical Execution. It is designed for Product Owners and Founders who manage both the business viability and the product delivery.
📈 1. Business Strategy & Discovery
Product Market Research & Market Fit
Before building anything, validate market demand for the product you intend to create.
- Identify the Problem: What specific pain point or unmet need does your product solve?
- Competitor Analysis: Who else is solving this problem? How can you differentiate (Price, Speed, Quality, UX)?
- Target Segment: Who is your ideal early user, and what triggers them to seek a solution?
- Validation Methods: Customer interviews, landing page tests, smoke tests — validate demand before writing production code.
Jobs-To-Be-Done (JTBD) Framework
People don't buy products; they "hire" them to get a job done.
- The JTBD Statement: "When [Situation], I want to [Motivation], so I can [Expected Outcome]."
- Example: "When I am commuting, I want to listen to educational content easily, so I can feel productive."
- Focus: Build features that directly solve the core Job, not just what users say they want.
More from kinhluan/skills
ddd-tactical
Tactical Domain-Driven Design (DDD) with Scoring Rubric. Use this skill when designing internal domain models or performing architectural reviews to ensure domain logic is isolated and rich.
7scheduling-algorithms
Job scheduling algorithms for parallel and distributed systems
7ddd-core
Professional Strategic Domain-Driven Design (DDD) Hub. Use this skill for Event Storming, identifying Subdomains, defining Bounded Contexts, and mapping Domain Models to the heart of your architecture.
6c4-level3-component
Specialized in Component diagrams (Level 3) with folder structure mapping. Use this skill when the user needs to zoom into a single container to identify internal components, their responsibilities, and how they map to actual code folders (src/services, internal/).
6security-analysis
Security vulnerability analysis and auditing procedures
6docker-containerization
Docker containerization best practices and patterns
6