Growth hacker - 91 operation network
91 Operating VIP members are upgraded and enjoy many benefits, Click View>
X
tag=zeng-chang-hei-ke
 Growth Hacker: Practice and Experience of Several Common Activities

Growth Hacker: Practice and Experience of Several Common Activities

91 Operations

It is said that the most efficient growth routine in the near future is here, and interested partners can collect or praise it. Several keywords: e-commerce, social networking, autobiography, sense of urgency

 How Does Operation Xiaobai Become a Growth Hacker

How Does Operation Xiaobai Become a Growth Hacker

91 Operations

This article is a popular post. It is aimed at operational white people who are ignorant or ignorant of fission, because they often smell a sentence: Who can tell me how to do fission

 In addition to growth hackers, these "growth factors" also need attention

In addition to growth hackers, these "growth factors" also need attention

91 Operations

In recent years, the concept of growth hackers has become popular in the Internet circle. For a while, various theoretical articles, related training, and various growth strategies of growth hackers have been published

 What you understand about "growth hackers" may be wrong

What you understand about "growth hackers" may be wrong

91 Operations

When it comes to "growth hackers", it can be said that everyone on the Internet knows it. Different people have different understandings of growth. Today I will talk to you about what I think

 Increase hackers, product efficiency integration, private domain traffic, and understand the logic behind hot marketing words

Increase hackers, product efficiency integration, private domain traffic, and understand the logic behind hot marketing words

91 Operations

From increasing hackers to private domain traffic, it has been a hot word on the Internet since last year. In recent years, the slogan of "product effect integration" has been widely used by the Internet and e-commerce. This article, come

 Four step reconstruction and growth of hacker logic: in-depth analysis of 11 cases

Four step reconstruction and growth of hacker logic: in-depth analysis of 11 cases

91 Operations

The AARRR model, even the fresh students I lead, are familiar with, but it has little application value in the implementation process. In the final analysis, it is just that this theory is too general and not specific

 Paid members, increase the number of retained hackers after the death of hackers

Paid members, increase the number of retained hackers after the death of hackers

91 Operations

Zhihu Yanxuan members, Jingdong Plus, Ali 88VIP, Meituan takeout members... suddenly, like a spring breeze overnight, thousands of Internet members

 Method+example: a low-cost growth hacker experiment from 0 to 1

Method+example: a low-cost growth hacker experiment from 0 to 1

91 Operations

With the disappearance of demographic dividend and mobile Internet traffic, the growth environment of a product has completed the transformation from extensive growth to lean operation

 Growing hackers is just a daily job

Growing hackers is just a daily job

91 Operations

After the concept of growth hacker was introduced into China, through the joint efforts of everyone, the Internet industry is now well-known; I had the honor to participate in the

 Growth hacker, an architecture that destroys companies

Growth hacker, an architecture that destroys companies

91 Operations

"Rapid growth+financing+listing/acquisition" is the growth path of most Internet companies, including Ruixing Coffee, which is a transformation of Internet thinking

 Before PMF is implemented, it is meaningless to pursue growth hackers

Before PMF is implemented, it is meaningless to pursue growth hackers

91 Operations

The product fit market (PMF) is the first stage of the product and the lever to promote the interaction between the product and the user. Before this stage is reached

 2018, the most popular 10 growth hacker strategies

2018, the most popular 10 growth hacker strategies

91 Operations

  ———— / BEGIN / ————   1. Users of short video streaming dithering

 WeChat 7.0 Revised Growth Hacker Guide

WeChat 7.0 Revised Growth Hacker Guide

91 Operations

The revision of WeChat to 7.0 can be said to be a big thing for the Internet in 2018. It happened at the end of the year, which has a very special meaning.   &nbs…

 A Case Study of "Flying Normal" Hacker

A Case Study of "Flying Normal" Hacker

91 Operations

Products are value creation, and growth is more value release. In today's market, which is no longer barbaric, can we achieve effective growth

 Three tables tell you how growth hackers do operational data analysis

Three tables tell you how growth hackers do operational data analysis

91 Operations

The common indicators in daily operation work are the promotion of innovation, activation and retention. These indicators can provide statistical feedback on the growth of APP users. But for many operations



Scan code to join 91 operation community