Skip to main content

Steve Jobs: 10 Presentation Tactics for Ad Agency New Business


Steve Jobs has something to teach small to midsize ad agencies 

about pitching for new business.

Every new business pitch should do three things: inform, educate and entertain.


BusinessWeek.com columnist Carmine Gallo reveals the techniques that have turned Apple CEO, Steve Jobs, into one of the world’s corporate presenters. There are some helpful nuggets that will add punch to your next agency pitch.
Here is the ‘Readers Digest’ version of his 10 Ways to Sell Your Ideas the Steve Jobs Way:
  1. Plan your presentation with pen and paper. Begin by storyboarding your presentation. Steve Jobs spent his preparation time brainstorming, sketching and white-boarding before he creating his presentation. All of the elements of the story that he wants to tell are thought through, elements are planned and collected before any slides are created.
  2. Create a single sentence description for every service/idea.Concise enough to fit in a 140-character Twitter post. An example, for the introduction of the MacBook Air in January, 2008, Jobs said that is it simply, “The world’s thinnest notebook”.
  3. Create a villain that allows the audience to rally around the hero—you and your product/service.  A ‘villain’ doesn’t necessarily have to be a direct competitor. It can be a problem in need of a solution.
  4. Focus on benefits. This is important for ad agencies to remember. Your audience only cares about how your service will benefit them so lead with benefits rather than agency credentials and capabilities.
  5. Stick to the rule of three for presentations. Almost every Jobs presentation was divided into three parts. You might have twenty points to make, but your audience is only capable of retaining three or four points in short-term memory. Give them too many points and they’ll forget everything you’ve said.
  6. Sell dreams, not your services. Steve Jobs didn’t sell computers. He was passionate about helping to create a better world. That was the promise that he sold. For example, when Jobs introduced the iPod in 2001, he said, “In our own small way we’re going to make the world a better place.” Where most people see the iPod as a music player, Jobs saw it as a tool to enrich people’s lives.
  7. Create visual slides. There were no bullet points in a Steve Jobs’ presentation. Instead he relied on photographs and images. When Steve Jobs unveiled the Macbook Air, Apple’s ultra-thin notebook computer, he showed a slide of the computer fitting inside a manila inter-office envelope. Keep your agency presentation’s that simple.
  8. Make numbers meaningful. Jobs always put large numbers into a context that was relevant to his audience. The bigger the number, the more important it is to find analogies or comparisons that make the data relevant to your audience.
  9. Use plain English. Jobs’s language was remarkably simple. He rarely, if ever, used the jargon that clouds most presentations—terms like ‘best of breed’ or ‘synergy’. His language was simple, clear and direct. So don’t use agency speak when presenting, “integration, proprietary process, etc.”
  10. Practice, practice, practice. Steve Jobs spent hours rehearsing every facet of his presentation. Every slide was written like a piece of poetry, every presentation staged like a theatrical experience. Steve Jobs made a presentation look effortless but that polish came after hours and hours of arduous practice. Agencies often are forced to rely on spontaneity to provide creative energy for a pitch because they have spent all of their time on putting together the presentation and leave little or no time for rehearsal. Most unrehearsed pitches end up falling flat.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principl...

10 Steps to Become a Top Information Security Professional: A Comprehensive Guide

In 2024, the demand for skilled information security professionals is higher than ever. As cyber threats continue to evolve, organizations around the globe are in desperate need of experts who can safeguard their critical data and systems. If you're aspiring to become one of the best in the field, you're in the right place. This comprehensive guide outlines ten essential steps to help you build a successful career in information security. From foundational education to advanced certifications, hands-on experience, and continuous learning, we'll cover everything you need to know to excel and stand out in this dynamic industry. Let's embark on your journey to becoming a top-tier information security professional. 1. Foundation in Computer Science Degree : Obtain a degree in computer science, information technology, or a related field. This will provide you with a strong foundational knowledge. Programming : Learn multiple programming languages such as Python, C++, Java, a...

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત...