CA VA TOURNER MAL APRES RESTE JUSQU'A LA FIN
CA VA TOURNER MAL APRES
-------------------------------------------
Rodolfo y el Chef Jesús celebran el Día Nacional del Apretón de Manos - Duration: 1:22. For more infomation >> Rodolfo y el Chef Jesús celebran el Día Nacional del Apretón de Manos - Duration: 1:22.-------------------------------------------
Actualización Gratuita de Julio - 4 Jugadores Modo Fiesta. - Duration: 1:53. For more infomation >> Actualización Gratuita de Julio - 4 Jugadores Modo Fiesta. - Duration: 1:53.-------------------------------------------
10 millones de árboles plantados con Ecosia - Duration: 1:10. For more infomation >> 10 millones de árboles plantados con Ecosia - Duration: 1:10.-------------------------------------------
We got hacked!? | Message from Vlad | Block Strike - Duration: 1:10. For more infomation >> We got hacked!? | Message from Vlad | Block Strike - Duration: 1:10.-------------------------------------------
Tour de France Stage 1 Course Preview – Riding The Düsseldorf Time Trial - Duration: 6:13.- The 2017 Tour de France starts right here,
in the city of Dusseldorf in Germany,
with a 14 kilometre time trial.
We're gonna take a very close look
at the course to see
just what's in store,
see who might be in the running to take the stage win,
and therefore, the first yellow jersey of the race.
Take it away, Tom.
5,4, 3, 2, 1, ALLEZ!
Go on, mate!
Good luck.
(upbeat music)
So, this stage is technically a time trial
and not a prologue,
and that's because a prologue
needs to be under 8 kilometres long,
and this one is, of course, 14 kilometres long.
After rolling down the start ramp,
the runners then take a slight left
and they're on to this road,
which is dead straight, four kilometres,
not a turn in sight,
and a total drag strip,
much like the rest of the course,
which is also (background sounds drown out voice)
tailor made for, dare I say it,
Tony Martin.
He's world time trial champion.
He's German.
He's been world time trial champion
three times before his current title,
and he likes to push a massive 58-tooth chainring.
That's huge!
It's unbelievable.
- [Host] As Tom said,
it is almost completely flat.
The only gradient, in fact,
are bridges to cross the river Rhine,
gaining a total altitude of just 22 metres.
Now, I did have a look,
and there is actually a Strava KOM up for grabs
on each one,
even if the Tour itself has no mountains points on offer,
on this particular stage.
- From there, the riders head over the bridge,
over the river Rhine.
It's actually the highest point on the course,
36 metres above sea level,
but I doubt it's gonna break their rhythm up too much.
Once they're over the bridge,
they've got a nice little
270 degree corner to deal with.
- Wait a minute.
Not so fast, Tom.
You can't just gloss over this river.
It's helped to make Dusseldorf
one of Germany's most important economic centres.
Not only that,
it's also the capital of fashion here.
That's right.
It's earned itself the nickname of The Little Paris,
and then one last thing before you go.
Dusseldorf is actually
the sixth-highest ranked city in the world
for quality of life.
- Yeah.
Thanks for that, Si,
but it's safe to say that
at this point in the stage,
no rider's gonna be enjoying themselves that much.
Six kilometres in,
just heading back over the bridge
and back to the other part of the course.
- Did you know, Tom,
that Dusseldorf is famous for, among other things,
its table tennis team.
Borussia Dusseldorf.
- Thanks, Si.
Really great facts there,
but back to the cycling.
- And,
it's got 300 kilometres of bike paths.
- Back to the cycling, again.
As we ride through the old town in Dusseldorf here,
we're heading towards the eight kilometre mark,
where the riders will get their
intermediate time check on today's stage.
What about the favourites?
I've already mentioned Tony Martin,
but other riders who could be up there include
Jonathan Castroviejo of Movistar Team,
He's a three-time Spanish National Time Trial champion;
Stefan Küng of BMC.
What about Taylor Phinney,
from Cannondale-Drapac riding, would you believe in,
his first ever Tour de France,
and I think we should also mention the Team Sky duo of
Vasil Kiryienka and Michal Kwiatkowski.
In my aero tuck there,
I forgot to mention another two favourites,
so Primoz Roglic and Jos Van Emden of Lotto NL Jumbo,
who both had really impressive wins
in time trials this year,
so they're also riders to watch.
(energetic music)
- Tom!
Good effort, mate!
I reckon that's a pretty solid marker
for Tour de France riders to aim for, actually.
Any idea what your time was?
- Yeah, I think so.
I averaged 25 kilometres an hour,
I think so.
- 25 K an hour?
- Yeah, yeah.
33 minutes, 26 seconds.
- Okay, well,
presumably,
a fair bit of that was spent at traffic lights, right.
- Yeah, fair chunk.
We need to review the footage,
but I think a lot of that, yeah.
- Well, okay.
Let's round it down.
15 minutes?
- Yeah.
15 minutes sounds fair,
and especially when you consider
that the fastest time-trial in Tour de France history
was Rohan Dennis in Utrecht in 2015.
The course was very similar to the one here.
He averaged 55 kilometres an hour,
and that gave him a time of around 15 minutes, too.
Spot on, I'd say.
- Okay.
Well, maybe we'll just add one or two seconds on.
Either way,
this is a super fast course, isn't it?
You've already talked about the favourites for this stage,
but what about the GCN favourites?
How are they gonna get on?
- Well, I actually don't think
that they're going to be too far up the field,
because there are limited time-trial kilometres
in this year's Tour de France,
which, to me,
means that it would make sense
for them to have spent more time
training their climbing prowess,
rather than time trial chops.
- Yeah, I agree, actually.
If we go back to that 2015 time trial in Utrecht,
the one that Rohan Dennis bossed,
Contador, Froome, Porte, and Quintana
all were grouped very close together,
and they all conceded around about a minute
to the flying Rohan Dennis.
The only thing I could see that might be different
this time around is that actually,
Richie Porte has been showing some supreme form
in time trials as well as on climbs.
So, actually,
he's definitely worth a little tip
for the stage win as well.
- Yeah, he could well be,
but if an overall favourite doesn't win this stage,
all is not lost,
because if you think back to the 1998 Tour
with Marco Pantani,
in the prologue there,
he was 181st out of 189 riders.
He still went on to win the race.
- Yeah, that was a crackin' ride,
but I'm not entirely sure we're gonna see anything
quite like that ever again.
- No, I doubt we'll see it this year.
This year, the Tour de France starts
on Saturday, the first of July,
right here in Dusseldorf.
We're gonna be here all week getting
some more great content for you to check out.
- That's right,
so it would be a great idea, actually,
if you don't already,
to subscribe to GCN,
and that way,
you're not gonna miss any of it.
It's very simple.
Just click on the globe.
- And once you've done that,
there's a link on-screen where you can visit our shop
and get some limited-edition threads
like Si is modelling right there.
If you'd like to check out our Tour de France playlist,
which we'll be updating throughout the race,
click right there,
and see one of Si's favourite ever
Tour de France videos,
Disc Brakes - The Chorizo Test.
- Yeah, and Tom also will be wearing some
GCN merchandise very soon as well,
covering up those nipples,
which we've all had enough of,
I think we can agree.
(laughs) - I'm sorry.
-------------------------------------------
8 TYPES DE CHAUSSURES D'ÉTÉ ♡ QUI FONT DU MAL À TES PIEDS - Duration: 5:51. For more infomation >> 8 TYPES DE CHAUSSURES D'ÉTÉ ♡ QUI FONT DU MAL À TES PIEDS - Duration: 5:51.-------------------------------------------
Road to KennyS #3 - Un shoot de poney constipé! - Duration: 1:55. For more infomation >> Road to KennyS #3 - Un shoot de poney constipé! - Duration: 1:55.-------------------------------------------
Le cacatoès noir, as de la percussion - Duration: 1:16. For more infomation >> Le cacatoès noir, as de la percussion - Duration: 1:16.-------------------------------------------
Comment changer la carte de commande de votre Cookéo Moulinex 6L ? - Duration: 12:06. For more infomation >> Comment changer la carte de commande de votre Cookéo Moulinex 6L ? - Duration: 12:06.-------------------------------------------
THE GOLF CLUB 2 1080p - Trailer de Lançament (PS4)[LEGENDADO EM PTBR] - Duration: 1:24. For more infomation >> THE GOLF CLUB 2 1080p - Trailer de Lançament (PS4)[LEGENDADO EM PTBR] - Duration: 1:24.-------------------------------------------
Bitcoin y Criptomonedas en Español - 2.2 Consenso sin identidad: la cadena de bloques - Duration: 18:01.So let's now dig into the technical details of Bitcoin's consensus algorithm.
And while we're looking at that, we should keep in mind that Bitcoin does all of this
without nodes having any persistent long term identities.
This is, yet again, a difference from how traditional distributive consensus
algorithms operated and if nodes did have identities,
it would make things a lot easier for a couple of reasons.
One is a pragmatic reason.
It would allow you to put into your protocol things like, now the node
with the lowest numerical ID should take some step or something like that.
So that's a simple pragmatic reason which, already if nodes are completely anonymous,
becomes harder to do.
But a much more serious reason for nodes to have identities, is for security,
because if nodes were identified,
and they weren't attribual to create new node identities, then we could
make assumptions like, let's say that less than 50% of the nodes are malicious.
And we could derive security properties out of that.
So for both of those reasons,
the consensus protocol in Bitcoin is a bit harder.
But why is it exactly that Bitcoin nodes don't have identities?
Well, it's for a couple of reasons.
One is that if you're in a decentralized model in a peer-to-peer system,
there is no central authority to give identities to nodes and
verify that they're not creating new nodes at will.
And, in fact, the technical term for this is a Sybil attack.
Sybils are just copies of nodes that a malicious adversary can create
to look like there are a lot of different participants, when in fact,
all those pseudo participants are really controlled by the same adversary.
The other reason is that pseudonymity is inherently a goal of Bitcoin.
Even if it were possible or easy to establish identities for all nodes or
all participants, we wouldn't necessarily want to do that.
So, Bitcoin doesn't give you strong anonymity guarantees out of the box,
in that the different transactions that you make can probably be linked together,
but at the same time nobody is forcing you to put your real life identity,
like your name or IP address or anything like that, in order to participate in
the peer-to-peer network and in the block chain, and that's an important property.
So, what we can do instead is we can make a weaker assumption.
And I kind of wanted you to take a leap of faith with me here
that this weaker assumption is something that is going to be feasible.
And I'm gonna make this assumption here, and
later show you how this is actually accomplished.
And what this weaker assumption is, is that we're gonna assume that there is some
ability, somehow, to pick a random node in the system.
And a good motivating analogy for this, is a lottery or
a raffle, where any number of real life systems, we're tracking and
verifying people and giving them identities.
And verifying those identities is pretty hard and so what we do in those contexts
is we might give them tokens or tickets or something of that sort and
that then enables us to later pick a random token ID and call upon that person.
So we're gonna do something similar with respect to these Bitcoin nodes, and
further assume, for the moment, that this token generation and
distribution algorithm has enough smarts so that, if the adversary is going to try
to create a lot of civil nodes, together, all of those civils just get one token, so
the adversary is not able to multiply his power that way.
So let's make this assumption for now, and
let's see what becomes possible if we make this assumption.
Here's the key idea.
What becomes possible under this assumption of random node selection and
something called implicit consensus.
So what is implicit consensus?
In each round, and there are gonna be multiple rounds,
each round corresponding to a different block in the block chain,
in each round a random node is somehow selected, magically for the moment.
And this node gets to propose the next block in the chain.
There is no consensus algorithm.
There is no voting.
This node simply unilaterally proposes what the next
block in the block chain is going to be.
But what if that node is malicious?
Well, there is a process for this, but it is an implicit one.
Other nodes will implicitly accept or reject that block.
And how will they do that?
If they accept that block, they will signal that acceptance
by extending the block chain starting from that block, or if they reject that block,
they will extend the chain by ignoring that block and
starting from whatever was the previous, latest block in the block chain.
And technically, how is that implemented?
Recall that each block contains a hash of the block that it extends and
this is the technical mechanism that allows nodes to signal
which block it is that they are extending.
So, given this, this is what the overall consensus algorithm in Bitcoin is
going to look like.
Now this is a little bit simplified and the reason it's simplified is again that
I'm assuming sort of this magic random node selection process.
But except for
that simplification, this is pretty close to how Bitcoin actually works.
So whenever Alice wants to pay Bob, she will create a transaction, and
she will broadcast it to all of the nodes.
And any one of these nodes is constantly listening to the network and collecting
a list of outstanding transactions that have not yet made it into the block chain.
At some point,
one of these nodes is going to be randomly called upon to propose the next block.
It's going to round up all of the outstanding transactions that it's heard
about and propose that block.
Now presumably, that node was honest, but it could also be a malicious node or
a faulty node and propose a block that contains some invalid transactions.
Invalid transactions are those that don't have the right crypto signature or
where the transaction is already spent, in other words, an attempt to double spend.
So if that happens, other nodes are going to signal their acceptance or
rejection of the block, as we saw in the last slide, by either including the hash
of this latest block in their next block or ignoring this block and including
the hash of whatever was the previous block that they considered to be valid.
Right, so now let's try to understand why this consensus algorithm works.
And the way I like to understand this is instead of asking why this works,
let's try to ask how can a malicious adversary try to subvert this process.
So let's look at that for a second.
So here we have a couple of blocks in the block chain.
Assume that this extends to the left a long way back,
all the way to what is called the genesis block.
But here, I'm only showing you a couple of blocks in the block chain.
And that pointer that you see over there is
a block referring to what is the previous block that it extends,
by including a hash of that previous block within it's own contents.
So, a malicious attacker, let's call her Alice.
What might she try to do?
Can she simply steal Bitcoins belonging to another user at a different address that
she doesn't control?
Now, even if it is now Alice's turn to propose the next block in this chain,
she cannot steal other user's Bitcoins.
Why?
Because she cannot forge their signatures, so
as long as the underlying crypto is solid, she's not able to simply steal Bitcoins.
Another thing she might try to do, is if she really, really hates some other user,
Bob, then she can look at Bob's address and
she can decide that any transactions originating from Bob's address, she will
simply not include them in any block that she proposes to get onto the block chain.
In other words, she's denying service to Bob.
So this is a valid attack that she can try to mount.
But luckily, it's nothing more than a little annoyance,
because if Bob's block doesn't make it into the next block that Alice proposes,
he will just wait another block until an honest node gets the chance to propose
a block and then his transaction will get into that block.
So that's not really a good attack, either.
So the only one that we're really left with, for
what a malicious node can try to do here, is called a double spending attack.
So how might a double spending attack work?
To understand that, let's assume that Alice is a customer of some online
merchant or website run by Bob, who provides some online service,
in exchange for payment in Bitcoins.
Let's say he allows the download of some software.
So here's how a double spending attack might work.
Alice goes to Bob's website and decides to buy this item, pays for
it with Bitcoins, and what that means, in technical terms, is that she's
going to create a Bitcoin transaction from her address to Bob's address.
She broadcasts it to the network.
And let's say that some honest node creates the next block,
listens to this transaction, and includes it in that block.
So, what is going on here?
So, there is this block that was created by an honest node that contains
a transaction that represents a payment from Alice to the merchant, Bob.
By C subscript A, I mean, a coin belonging to Alice, and
that is now being sent to Bob's address.
Let's zoom into this in a little bit more technical detail.
A transaction, as we saw earlier, is a data structure that contains Alice's
signature here, and an instruction to pay to Bob's public key, and also a hash.
What is this hash?
This hash represents a pointer to the transaction where Alice,
in fact, received that coin from somebody else.
And that must be a pointer to a transaction that was included
in some previous block in the consensus chain.
So visually, it's going to look something like this.
Let's pause for a second here, because there's something subtle going on.
There are at least two different types of pointers
in this diagram that I've showed you.
There is, in fact, a third one corresponding to Merkle trace, but
we're not gonna look at that, at the present moment.
But this two types of pointers that I refer to, are blocks that include a hash
of the previous block that they're extending, and transactions that
include a pointer to whatever the previous transaction that where the coin came from.
Right, so this is the situation, and this block was now generated by an honest node,
and now let's assume that the next time a random node is called,
that node is a malicious node controlled by Alice.
Right, so this is the block chain as it stands right now.
Bob has already looked at this block chain, decided that Alice has paid him,
and has allowed Alice to download the software or
whatever it is that she was buying on his website.
Right, so as far as Bob is concerned, he is satisfied, the transaction is
completed, Alice has now received her goods in exchange for the payment.
Now what might happen, is if Alice now gets to propose the next block,
she could propose a block that looks like this.
Ignores altogether this valid block over here, and
instead, contains a pointer to the previous block.
And furthermore,
it's going to contain a transaction that contains a transfer of coins,
of Alice's coins to another address, A prime, that's also controlled by Alice.
So this is a classic double-spend pattern.
What is going on here, is Alice now creates a new transaction that
transfers that coin, instead of to Bob's address, to another address owned by her.
And visually it's gonna look like this.
This is a completely different transaction,
also with the hash pointer going back to same transaction referred to earlier.
Right, so this is what an attempt at a double-spend look like.
And how do we know if this double-spend attempt is going to succeed or not?
Well, that depends on whether this green transaction here or this red transaction
is going to ultimately end up in the long term consensus chain.
So what determines that?
That is determined by the facts that honest nodes
are always following the policy of extending the longest valid branch.
So now, which of these is the longest valid branch?
You might look at this and say, a-ha, the first one is the longest valid branch,
not the second one, because it's a double-spend attempt.
But here's a very subtle point that I want you to appreciate, from sort of a moral
point of view, this transaction in green and the transaction in red might look very
different, because based on the explanation that I've given you,
the first one is an attempt by Alice to pay Bob, whereas the second one
is an attempt by Alice to defraud Bob and pay coins back to herself.
But from a technological point of view,
these two transactions are completely identical.
The nodes that are looking at this,
really have no way to tell which one is the legitimate transaction.
I'm putting legitimate in air quotes,
because it's a moral judgment that we apply to it,
it's not a technical distinction, versus which one is the attempted double-spend.
It could easily be the other way around.
Now, nodes often follow a heuristic of extending the block that they first
heard about on the peer-to-peer network, but it's not a solid rule.
And in any case,
because of network latency, that could easily be the other way around.
So now there is at least some chance that the next node
that gets to propose a block will extend this block instead of this one.
Or it could be that even if it's an honest node, Alice could try to bribe that node
or try to subvert the process in a variety of ways.
So for whatever reason, without going too much into the details, let's say that
the next node extends the block with the red transaction instead of the green one.
What this means is that at this point,
the next honest node is much more likely to extend this block instead of this
one because now this has become the longest valid chain.
So let's say that after one more block, the situation looks like this.
Now it's starting to look pretty likely that this double-spend has succeeded,
in fact, what might happen is that this ends up the long term consensus chain and
that this block gets completely ignored by the network, and this is now called
an orphan block, and this is an example of a successful double-spend.
So now let's look at this whole situation from Bob, the merchant's point of view,
and understanding how Bob can protect himself from this double-spending attack,
it's really gonna be a key part of understanding Bitcoin security.
So let's look at what happened here again.
We have a couple of blocks in the block chain.
And at this point,
Alice broadcasts a transaction that represents her payment to Bob.
And so Bob is going to hear about it on the peer-to-peer network right here,
even before the next block gets created.
And so, Bob can do something even more foolhardy than what he did in the previous
light which is, that as soon as he hears about the transaction on the peer-to- peer
network, he can complete the transaction on the website and
allow Alice to download whatever she's downloading.
That's called a zero confirmation transaction.
Or, he could wait until the transaction gets one confirmation in the block chain,
which means that at least some node has created a block and has proposed
this transaction and that has gone into the block chain, but as we saw earlier,
even after one confirmation, there could be an attempt at a double-spend.
So let's say that this actually happens.
If, as in the previous slide, the double-spend attempt succeeds,
what Bob should do is to realize that the block that he though represented
Alice paying him has now been orphaned, and so he should abandon the transaction.
Instead, if it so happens that despite this double-spend attempt, the next block
that's generated turns out to extend the block that he's interested in,
now he sees that his transaction has two confirmations in the block chain.
Now he gets a little more confidence that his transaction is going to end up
on the long term consensus chain.
So let's say there's one more, and now there are three confirmations, in general,
the more confirmations your transaction gets, the higher the probability
that it is going to end up on the long term consensus chain.
Because if you recall, the honest node's behavior,
that they will always extend the longest valid branch that they see, the chance
that this one is going to catch up to this longer branch is now very minuscule,
especially if only a minority of the nodes are malicious.
Right, because, typically, the only reason that this double-spend attempt block would
be extended at this point, is if the next node to be picked randomly was a malicious
node, and then you'd need another malicious node and
then another for this shorter branch to then become the longer branch.
In general, the double-spend probability decreases exponentially with
the number of confirmations.
So, if the transaction you're interested in has received k confirmations,
then the probability that this other transaction is going to end up on the long
term consensus chain, goes down exponentially as a function of k.
And the most common heuristic, that's used in the Bitcoin ecosystem,
is that you wait for six confirmations.
There is nothing really special about the number six.
It's just a good trade-off between the amount of time you have to wait and
your guarantee that the transaction you're interested in
ends up on the consensus block chain.
So let's recap what we saw here.
Protection against invalid transactions,
that is protection against a malicious node, simply making up a transaction to
steal someone's Bitcoins, is entirely cryptographic.
But it is enforced by consensus, which means that if a node does attempt that,
then the only reason that that transaction won't end up in the launch group consensus
chain is because a majority of the nodes are honest and
will treat that transaction as invalid.
On the other hand, protection against double-spending is purely by consensus.
Cryptography has nothing to say about this and true transactions that represent
a double-spending attempt, kind of look identical
from the prospective of signatures, and so on, but it's the consensus that determines
which one will end up on the long term consensus chain.
And finally, you're never 100% sure that a transaction you're interested in is on
the consensus branch, but this exponential probability guarantee is pretty good.
After about six transactions,
there's virtually no chance that you're gonna go wrong.
-------------------------------------------
Maquillaje Semi Permanente de Cejas / Diseño de Cejas - Vanitas Espai - Duration: 0:53. For more infomation >> Maquillaje Semi Permanente de Cejas / Diseño de Cejas - Vanitas Espai - Duration: 0:53.-------------------------------------------
[Livre Audio/Sous-titres] Guy de Maupassant - L'Endormeuse (Contes Fantastiques) - Duration: 21:51. For more infomation >> [Livre Audio/Sous-titres] Guy de Maupassant - L'Endormeuse (Contes Fantastiques) - Duration: 21:51.-------------------------------------------
Ending (true Kasumi) - Dead or Alive 5: Last Round - Duration: 8:11. For more infomation >> Ending (true Kasumi) - Dead or Alive 5: Last Round - Duration: 8:11.-------------------------------------------
HOMEM-ARANHA: REGRESSO A CASA - GRANDE ENTRADA DE TOM HOLLAND NA ANTESTREIA - Duration: 2:23. For more infomation >> HOMEM-ARANHA: REGRESSO A CASA - GRANDE ENTRADA DE TOM HOLLAND NA ANTESTREIA - Duration: 2:23.-------------------------------------------
Cimentación y colocación de poste para vallado. - Duration: 1:12. For more infomation >> Cimentación y colocación de poste para vallado. - Duration: 1:12.-------------------------------------------
La sonorisation de l'habitacle CabinTalk (MC) de la Honda Odyssey 2018 - Duration: 0:26. For more infomation >> La sonorisation de l'habitacle CabinTalk (MC) de la Honda Odyssey 2018 - Duration: 0:26.-------------------------------------------
Bem-Vindo Romeiro | Mensagem de Fé: a importância de São Pedro e São Paulo - 29 de Junho de 2017 - Duration: 4:40. For more infomation >> Bem-Vindo Romeiro | Mensagem de Fé: a importância de São Pedro e São Paulo - 29 de Junho de 2017 - Duration: 4:40.-------------------------------------------
DANS LES COULISSES DE BIG MOUSTACHE - Duration: 3:40.We arrived on a market where the buying habits were strongly imbedded.
We are confronting two historical giants and clients that have bought
the same products in the same malls for 15 years
We arrived with a new brand, a new product
we were exclusively online
That challenge was huge, but we were deeply confident of our business model
One morning, I was in my bathroom and I realized that I've been using the same razor
that a brand offered me at a student event 10 years ago
and that I have been going to the store
to buy the same replacement blades no questions asked ever since
so I said to myself: there must be something we can do.
There is a broad market
split between two actors
so that when we walk along the aisles
we realize that the products are expensive
and that even though there is a lot of choice, the products all come from the same brand
and are sold in supermarkets only.
Big Moustache is the first service that offers a home-delivered box upon subscription for your razors and blades.
Since the beginning our offer has been very simple
we sell the best products, with the highest quality
cheaper than the others and in a simpler way.
Our top priority is the quality of the blades
on the first hand, we met the users
to understand their expectations and the men's needs
when it comes to their razors
On the other hand, we talked with a whole bunch of suppliers
Finally we came up to two razors : one with 3 blades, the other with 5 blades.
Meanwhile, we launched our website. There was a lot at stake for us
because it was the only sales channel for our subscription boxes
The first members were my friends
And then friends of friends
we monitored it closely
until the moment when people that we didn't know started their plan
back then we said to ourselves « it's real »
A month after Big Moustache website was launched in March 2013
Canal+ came to do a story about us
It was quite spectacular because within a couple of hours
we had more than a thousand new subscribers
and we had to deal with those new orders logistically speaking during the same day
We wanted it all to be perfect because we desired that each new subscriber
became an ambassador of the brand
At the end of 2013, we raised equity funds for the first time
from the incubator Day One Partners
It was a milestone for us
it allowed us to hire and think bigger when it comes to the web development and the marketing fields
We realized that people liked this business model
They also liked the products and the service. At that time, it became a necessity to spread the word.
Every month I used to randomly contact 200 users
to hear their feedbacks and gather the axis of improvements
Rapidly, people started asking for new products
Thus I realized the mightiness of this community
and the fact that we would be able to build the brand Big moustache together
For our range of products meaning our skin and beard cares, our facial oils.
we did the exact same thing that had worked with our razors:
we surveyed our subscribers about their expectations when it comes to shave cares.
Soon after we looked for a French laboratory to support us
we experimented every product at Big Moustache and we sent samples to testers
to collect their feedbacks about the textures and the scents of our products
2017 has been a structuring year for Big Moustache,
the consulting firm Sia Partners invested in the company
We are now hosted in their premises, we work hand in hand on the new projects
The new website has just come out, we outsourced the whole logistics
And we have designed new products this year, we resume our at-home barber service
And breaking news we will finally have our own barber shop in Paris
Since the beginning of our adventure we do care about
being close to our community. We still solicit their opinion all the time
to design new products and new services
With the same philosophy :
To offer products that are simple, efficient and always at the right price.
Không có nhận xét nào:
Đăng nhận xét