Share this
Success = Hard Work
by Ken Carnesi on Oct 11, 2017 12:00:00 AM
Everyday I see articles and blog posts with titles such as “4 Things Every Startup Founder Should Know” or “How to Raise $10M.” This sort of stuff may be useful for some people. However, I suspect such writeups are often telling you things you already know (in one way or another).
What I rarely see are write ups that talk about brute force effort and persistence. I don’t think there are any secrets to success. You generally have a good idea or not. Yes, it needs to be executed properly, but that’s only part of it. You must work hard, and invest time and effort to learn every aspect of the business.
My two favorite quotes/anecdotes on this topic are:
1.) A business takes years to become an “overnight success.”
2.) In a rarely watched commencement speech at USC, Elon Musk said“ If you do the simple math, say that someone else is working 50 hours and you’re working 100, you’ll get twice as much done in the course of a year as the other company.”
I couldn’t agree more, Elon.
As the CEO of an early stage startup, I must wear many hats and achieve success through significant effort on a daily basis. In fact, to close out the blog post, to illustrate what a typical day looks like as the CEO of DNSFilter. This was my schedule on September 7th:
8:40AM-9AM:
Research Kanban & Agile development processes in order to improve DNSFilter effectiveness/efficiency. (If interested, here is a great technical video on this topic from the XBOX development team leader.)
9AM-9:30AM:
Sales call with Fortune 500 CTO
9:30AM-10AM:
Test out VPN tunneling solution for large Government customer.
10AM-11AM:
Pre-drywall meeting at new home.
11AM-Noon:
Meet with DNSFilter CTO to discuss hiring of additional/new developers.
Noon-12:30PM:
Invoice and onboard four new school customers.
12:30PM-1PM:
Final VPN testing for Government customer.
1PM-2PM:
Head to bank to open up new DNSFilter account.
2PM-2:30PM:
Lunch
2:30PM-3PM:
Respond to emails/sales tickets.
3–3:30PM:
Meet with DNSFilter CTO & CIO for employee onboarding/hiring.
3:30PM-4PM:
Create new UI mockups for dashboard improvements.
4PM-4:30PM:
Two 15 minute sales calls.
4:30PM-4:45PM:
Answer emails.
4:45PM-5PM:
Break.
5PM-5:30PM:
Present VPN solution to large Government customer.
5:30PM-6PM:
Onboard two new DNSFilter partners.
6PM-6:50PM:
Fix bug with partner program onboarding automation.
7:15PM-7:45PM:
Arrive home. Quick dinner with my girlfriend (who wishes I had more time).
7:45PM-8:15PM:
Edit and submit mockup and corresponding GitHub issues to kick off development.
8:15PM-9:30PM:
Write up proposal and plan for implementation of improved development process.
9:30PM-10PM:
Implement Waffle and sync GitHub issues for new development process, integrate WIP (work in progress) limits to the workflow.
10PM-Midnight:
Respond to Government RFP.
And there you have it — a standard 15–16 hour day. Only four or five more to go this week!
Share this
 7 Cybersecurity Predictions for 2026
                  7 Cybersecurity Predictions for 2026
                  AI and other technologies are fundamentally reshaping the security world. It’s never too early to prepare, which is why we're dropping our predictions for 2026 ahead of schedule! We went straight to the source, surveying our internal team of cybersecurity and technology specialists to find out where they see the battle lines forming. Here’s what our experts predict.
 The Hire the Stakes, The Greater the Fall
                  The Hire the Stakes, The Greater the Fall
                  Another late night, exhaustion and sore eyes setting in after sending what felt like the thousandth job application on your list, when yet another reply hits your inbox with the words, “Unfortunately we…”You don’t even need to read the rest; you’re familiar enough with how this goes. Woefully, you sit thinking about the work you’ve put into the job search: The degree, the blood, the sweat, the tears—ping. An email notification graces your frustra...
 Risky Apps for Business: Top Malware and Phishing Threats
                  Risky Apps for Business: Top Malware and Phishing Threats
                  Not all apps are created equal. Some introduce serious risks for phishing, malware, or data breaches, especially when they’re adopted by employees without IT approval. And while blocking a website at the domain can prevent unauthorized access on your network, many applications have hundreds or thousands of domains—simply blocking the main domain might not be enough to prevent access.


