[{"data":1,"prerenderedAt":5391},["ShallowReactive",2],{"{}global/app-links":3,"{}global/banner":54,"{}global/navbar":119,"{}global/footer":453,"{\"filter_query\":{\"component\":{\"in\":\"Blog Post Page,Blog Post Migrated Page\"},\"authorId\":{},\"categoryIds\":{}},\"by_uuids\":\"\",\"sort_by\":\"first_published_at:desc\",\"per_page\":3,\"version\":\"published\"}":553,"{}blog/polish-israeli-relations-technology":5301,"d876a579-9cff-4080-93d1-d2c98b5add5c-story":5355},{"data":4,"headers":31},{"story":5,"cv":28,"rels":29,"links":30},{"name":6,"created_at":7,"published_at":8,"updated_at":9,"id":10,"uuid":11,"content":12,"slug":17,"full_slug":18,"sort_by_date":19,"position":20,"tag_list":21,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":24,"first_published_at":25,"release_id":19,"lang":26,"path":19,"alternates":27,"default_full_slug":19,"translated_slugs":19},"app links","2023-09-11T05:31:27.452Z","2024-03-18T11:23:07.308Z","2024-03-18T11:23:07.334Z",368073957,"21b45049-0eb3-49cc-84c2-b64e6a87deaa",{"_uid":13,"component":14,"externalLinks":15,"internalLinks":16},"c61c33a3-acc2-473d-89dd-55ee67641394","appLinksList","gdpr-compliance-30-questions-to-be-answered,\nwebinar-wizualizacja-danych,\ntech-network,\nmonterail-expert-hubert-bialecki,\ndownload-ux-audit-template,\nvue-migration-cheat-sheet,\nmonterail-expert-thank-you,\ncross-platform-guide,\nvue-nuxt-migration,\nreferral-partner-program,\nvuejs-development-guide,\nen/newsletter-subscription-form,\nthank-you,\nvue-projects-by-monterail-vue-development-case-studies,\nproduct-spec,\ncommunity,\nmonteletter-subscription-confirmed,\nror-projects,\nwebinar,\nvuejs-bootcamp,\nform-tech-solution-fashion,\nsustainable-fashion-technology,\nvue-for-business-2021-report-thank-you,\nstate-of-vuejs-report-thankyou,\nsign-up-state-of-vue-2021,\nnewsletter-thankyou,\nestimate-thankyou,\ncontact-thankyou,\nyour-hr-tech-ebook,\nyour-product-spec-template","services,\ncontact,\nprojects,\nabout,\nresources,\nsoftware-development,\ncareers,\nprivacy-policy,\nprivacy-policy-for-employees-and-candidates,\nblog,\neu-program,\ncookie-declaration","app-links","global/app-links",null,40,[],false,330572742,"5a3ef0d9-1a68-4ef7-978b-c3acf7b68744","2023-09-11T09:25:03.012Z","default",[],1776349211,[],[],{"age":32,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":38,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":45,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":51,"x-runtime":52,"x-xss-protection":53},"153","max-age=0, public, s-maxage=604800, stale-if-error=3600","keep-alive","gzip","application/json; charset=utf-8","Thu, 16 Apr 2026 14:21:00 GMT","W/\"67aa43cec2568f578f3dc34c0026af59\"","strict-origin-when-cross-origin","5.747.1","nginx/1.29.1","chunked","Origin,Accept-Encoding","1.1 23e886f1dcf17062b1703f82e7f43e6e.cloudfront.net (CloudFront)","DMs5SfaBDyxJ9Ih5UkK1vJGbjwFv4CNzU5WUKQFD23qp0YUPw2E2eQ==","GRU1-P2","Hit from cloudfront","nosniff","SAMEORIGIN","none","2debc575-d742-49ae-a959-9d15d7026d51","0.028214","0",{"data":55,"headers":112},{"story":56,"cv":28,"rels":110,"links":111},{"name":57,"created_at":58,"published_at":59,"updated_at":60,"id":61,"uuid":62,"content":63,"slug":57,"full_slug":103,"sort_by_date":19,"position":104,"tag_list":105,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":106,"first_published_at":107,"release_id":19,"lang":26,"path":108,"alternates":109,"default_full_slug":19,"translated_slugs":19},"banner","2025-03-07T08:29:55.663Z","2025-10-23T12:24:19.826Z","2025-10-23T12:24:19.840Z",637001046,"4faf5a27-7862-4a60-b9c0-521bae9c30dd",{"_uid":64,"global":65,"component":102},"f085ace5-7a3f-444d-8fb2-cd964f75a4c6",[66],{"_uid":67,"text":68,"ctaLink":89,"component":100,"backgroundColor":101},"10374314-a362-4943-b1b5-bc9fb8512855",[69],{"_uid":70,"content":71,"fontSize":86,"component":87,"fontColor":88,"uppercase":22},"fd8ab370-c27f-4cf2-8be4-6135c53ab2f4",{"type":72,"content":73},"doc",[74],{"type":75,"attrs":76,"content":77},"paragraph",{"textAlign":19},[78],{"text":79,"type":80,"marks":81},"The New Default. Your hub for building smart, fast, and sustainable AI software","text",[82],{"type":83,"attrs":84},"textStyle",{"color":85},"#000000","1.8rem;2.97rem;-3%","baseText","white",[90],{"url":91,"_uid":96,"label":97,"component":98,"fontColor":88,"fontWeight":99},{"id":92,"url":93,"linktype":94,"fieldtype":95,"cached_url":93},"","http://thenewdefault.com/?utm_source=monterail&utm_medium=website&utm_campaign=TND","url","multilink","de564ec1-38ae-43b4-a732-d95e5d7ea1fd","See now","link","bold","promoBanner","vue-gradient","global","global/banner",-10,[],"3c4112d4-24c8-4129-9edf-9b8df913f668","2025-03-13T07:12:33.766Z","/",[],[],[],{"age":113,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":114,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":115,"x-amz-cf-id":116,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":117,"x-runtime":118,"x-xss-protection":53},"154","W/\"0adf1f26f785bc4654335965fd65df9a\"","1.1 284a3a41ad5cb362cfe2336c841cbbfa.cloudfront.net (CloudFront)","cKqljeCkegTt22HykkQr2BF2tJDquY4peu0rXgX6PLyN7a4wgSY4ng==","7e5a525b-da9e-4e07-8c5f-d6748e45f618","0.031114",{"data":120,"headers":448},{"story":121,"cv":28,"rels":446,"links":447},{"name":122,"created_at":123,"published_at":124,"updated_at":125,"id":126,"uuid":127,"content":128,"slug":122,"full_slug":440,"sort_by_date":19,"position":441,"tag_list":442,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":443,"first_published_at":444,"release_id":19,"lang":26,"path":108,"alternates":445,"default_full_slug":19,"translated_slugs":19},"navbar","2025-02-28T09:57:19.276Z","2026-01-21T13:23:57.702Z","2026-01-21T13:23:57.721Z",633436295,"cd451477-3966-4c58-992a-408f2659e218",{"_uid":129,"global":130,"component":102},"1991eba3-89fd-45a9-ab3d-2fc4bc11c54d",[131],{"_uid":132,"items":133,"component":439},"5aa5d8b1-c26e-4195-86dc-78c207f5479f",[134,251,340,368,432],{"_uid":135,"label":136,"navLink":137,"navList":141,"component":249,"featuredResource":250},"89f89998-d172-465b-9f35-400715b01d2d","Services",{"id":138,"url":92,"linktype":139,"fieldtype":95,"cached_url":140},"e599b429-b329-4ca0-b515-22c48c735517","story","services/",[142,165,199,215],{"_uid":143,"links":144,"title":163,"component":164},"c6caac44-728f-4cdb-90d0-75cc9d1da44c",[145,151,157],{"url":146,"_uid":149,"label":150,"component":98},{"id":147,"url":92,"linktype":139,"fieldtype":95,"cached_url":148},"993ed997-f990-4a45-98a1-748d83e3cfc5","services/web-application-development","80b1798e-906c-4a84-b349-6c2c2045100f","Web",{"url":152,"_uid":155,"label":156,"component":98},{"id":153,"url":92,"linktype":139,"fieldtype":95,"cached_url":154},"47c027fb-63cf-423f-8a68-912988fdc37c","services/mobile-development","1fc3d661-d0bd-4980-985a-cadca9527857","Mobile",{"url":158,"_uid":161,"label":162,"component":98},{"id":159,"url":92,"linktype":139,"fieldtype":95,"cached_url":160},"5aac7e1a-b6a6-40c8-9377-fab2f1eafe5b","services/artificial-intelligence-development-services","24478bc6-26fe-408d-a94b-6ddd15c4a4b4","AI solutions","SOFTWARE DEVELOPMENT","linkListWithHeader",{"_uid":166,"links":167,"title":198,"component":164},"35d94605-d1ed-41cb-aa2c-50a1b26c90f3",[168,174,180,186,192],{"url":169,"_uid":172,"label":173,"component":98},{"id":170,"url":92,"linktype":139,"fieldtype":95,"cached_url":171},"8f765b48-df5d-4976-9218-4d316a5165cb","services/vue-js-development","4786690a-e691-44cb-a207-e41003e1c53a","Vue.js",{"url":175,"_uid":178,"label":179,"component":98},{"id":176,"url":92,"linktype":139,"fieldtype":95,"cached_url":177},"b4b3c1ee-f6c8-4c3e-9e8b-6ac079bf8d00","services/ruby-on-rails-development-company","caf66a23-561f-4ac2-a33c-f37efdab8a2b","Ruby on Rails",{"url":181,"_uid":184,"label":185,"component":98},{"id":182,"url":92,"linktype":139,"fieldtype":95,"cached_url":183},"6793fcbf-1640-458e-bd70-133d307a25bc","services/flutter-development","47540b9c-9b11-4f59-bf35-ca5efda1c2b9","Flutter",{"url":187,"_uid":190,"label":191,"component":98},{"id":188,"url":92,"linktype":139,"fieldtype":95,"cached_url":189},"11f77acd-c0b2-4f4d-a49c-8ac06c33594f","services/react-native-development","72d55225-6e41-4d35-bc9f-6d3275eca84a","React Native",{"url":193,"_uid":196,"label":197,"component":98},{"id":194,"url":92,"linktype":139,"fieldtype":95,"cached_url":195},"57ffc2d4-e976-4b7f-885f-646e7ce87d1f","services/nodejs-development","d5dac158-501f-4f88-b58a-11363d49c628","Node.js","TECHNOLOGIES",{"_uid":200,"links":201,"title":214,"component":164},"648b8696-b270-41ba-b2d2-cfbefcfdf4c2",[202,208],{"url":203,"_uid":206,"label":207,"component":98},{"id":204,"url":92,"linktype":139,"fieldtype":95,"cached_url":205},"34366041-c090-4ab2-8bec-52bc75f648a6","services/product-design","9280f0c2-2660-4780-8e53-26e46f086d2b","Product design",{"url":209,"_uid":212,"label":213,"component":98},{"id":210,"url":92,"linktype":139,"fieldtype":95,"cached_url":211},"396e832f-e133-4852-b4bf-ad166f2c65b5","services/mvp-development","9b08f813-c6e8-4593-9edc-7e4b906f53a7","MVP Development","PRODUCT",{"_uid":216,"links":217,"title":248,"component":164},"61ed8268-92e8-4dd9-b93c-ec92c2d64286",[218,224,230,236,242],{"url":219,"_uid":222,"label":223,"component":98,"fontColor":92,"fontWeight":92},{"id":220,"url":92,"linktype":139,"fieldtype":95,"cached_url":221},"fb749ebf-5449-42b2-a9f8-a69c877654b2","services/healthcare-software-development","1d337f38-5a19-47a5-b30f-d15a4f3f61a1","HealthTech",{"url":225,"_uid":228,"label":229,"component":98},{"id":226,"url":92,"linktype":139,"fieldtype":95,"cached_url":227},"2ad5217e-ce66-4856-ab1b-a86a62cb6d63","services/fintech-software-development","80368e15-bc88-44a2-ac90-29a7246a2d3a","FinTech",{"url":231,"_uid":234,"label":235,"component":98},{"id":232,"url":92,"linktype":139,"fieldtype":95,"cached_url":233},"4b26f380-4829-44b6-a7d9-e7d2f25a817e","services/hr-tech-software-development","6db2b6a2-d213-4bb6-a5e1-88c35ed96f49","HRTech",{"url":237,"_uid":240,"label":241,"component":98},{"id":238,"url":92,"linktype":139,"fieldtype":95,"cached_url":239},"3d311168-908e-4e19-8836-8de42a991d25","services/retail-software-development","64b1abe6-b413-4dcb-9966-cf1edafa2e7f","Retail",{"url":243,"_uid":246,"label":247,"component":98},{"id":244,"url":92,"linktype":139,"fieldtype":95,"cached_url":245},"7becc096-d69d-4e0f-9f91-ad402f7929b0","services/real-estate-proptech-software-development","4615d54d-cd73-46b5-9140-c16cb3824a61","PropTech","INDUSTRY","navItem",[],{"_uid":252,"label":253,"navLink":254,"navList":257,"component":249},"7d2804ab-1611-4268-a5a0-5900f76d18fc","Clients",{"id":255,"url":92,"linktype":139,"fieldtype":95,"cached_url":256},"a0d8fc07-5d1c-43da-89e7-8899d0e63943","projects/",[258,274,296,318],{"_uid":259,"links":260,"title":273,"component":164},"41c0badc-fdda-4977-9a56-5a3ec6d43bfe",[261,267],{"url":262,"_uid":265,"label":266,"component":98},{"id":263,"url":92,"linktype":139,"fieldtype":95,"cached_url":264},"0f534228-99e9-4f1e-802d-398f3e863d6e","projects/pizza-hut","f1918385-8add-487d-8576-413df909affa","Pizza Hut",{"url":268,"_uid":271,"label":272,"component":98},{"id":269,"url":92,"linktype":139,"fieldtype":95,"cached_url":270},"adf03e4a-0523-421b-aded-6f1111c11e74","projects/merck-unite","0dd008dd-86a7-4f3b-a7d4-f7f9a61996f7","Merck","ENTERPRISES",{"_uid":275,"links":276,"title":295,"component":164},"658c3334-36ed-4e58-bfed-6ecd7dd9544d",[277,283,289],{"url":278,"_uid":281,"label":282,"component":98},{"id":279,"url":92,"linktype":139,"fieldtype":95,"cached_url":280},"f9f14dc8-9581-42ee-9bb3-9c25a68201ac","projects/cooleaf","0951912e-d5be-40e7-bdf8-b26a6814eb5e","Cooleaf",{"url":284,"_uid":287,"label":288,"component":98},{"id":285,"url":92,"linktype":139,"fieldtype":95,"cached_url":286},"2fbe08b9-a493-4ab4-9667-709388b2d18f","projects/flink","df78aa7b-01e9-42f3-8eb4-20ceb4f504ef","Flink",{"url":290,"_uid":293,"label":294,"component":98},{"id":291,"url":92,"linktype":139,"fieldtype":95,"cached_url":292},"1ebc1646-3a9d-4896-9d12-e258c69da449","projects/seat-unique","0eb745da-f28b-408c-8308-40e20896bc38","Seat Unique","SCALE-UPS",{"_uid":297,"links":298,"title":317,"component":164},"94af7d94-9c6e-48af-a272-a23cdd30569a",[299,305,311],{"url":300,"_uid":303,"label":304,"component":98},{"id":301,"url":92,"linktype":139,"fieldtype":95,"cached_url":302},"88d45a5e-4091-4db3-b41e-23bf04d5a990","projects/careerfit","5d4cc6aa-9867-463f-a951-06dc8581e956","CareerFit",{"url":306,"_uid":309,"label":310,"component":98},{"id":307,"url":92,"linktype":139,"fieldtype":95,"cached_url":308},"000bd399-91e0-47b4-acd8-d06aafd80515","projects/equinet","4aae5ffb-827d-4633-b8d9-1cfa359baff5","Equinet",{"url":312,"_uid":315,"label":316,"component":98},{"id":313,"url":92,"linktype":139,"fieldtype":95,"cached_url":314},"81da6efd-521d-4338-aeda-584c8822ef88","projects/systems-engineering","b16a223b-e3d0-4670-bb46-51ee12a10f2d","Systems Engineering","SMEs",{"_uid":319,"links":320,"title":339,"component":164},"20883f09-e33b-4abe-beeb-ca7cc27e7a0f",[321,327,333],{"url":322,"_uid":325,"label":326,"component":98},{"id":323,"url":92,"linktype":139,"fieldtype":95,"cached_url":324},"fd4726f1-0df4-467a-acb2-d0d0d77a4e0c","projects/flexxa","8087e964-7b57-4eb8-89ad-022595765faf","Flexxa",{"url":328,"_uid":331,"label":332,"component":98},{"id":329,"url":92,"linktype":139,"fieldtype":95,"cached_url":330},"5fd12c86-2dac-4808-8301-7c9d4c60d750","projects/octoberhealth","b124bc10-10cf-4974-bb88-8242840fb481","October Health",{"url":334,"_uid":337,"label":338,"component":98},{"id":335,"url":92,"linktype":139,"fieldtype":95,"cached_url":336},"6d61aa20-5f49-4447-bb0b-cb7334609cef","projects/sprii-case-study","833475f4-d80c-46ce-bf0b-0b7f4d2760c6","Sprii","START-UPS",{"_uid":341,"label":342,"navLink":343,"navList":346,"component":249,"featuredResource":367},"ee52511f-51db-48ec-b027-36e32baf853d","About us",{"id":344,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"967c895c-f374-4364-b7e1-e3caaa0fdc6b","about/",[347],{"_uid":348,"links":349,"title":92,"component":164},"dbb1c16c-d340-411e-9891-dcb84671dc8f",[350,355,361],{"url":351,"_uid":353,"label":354,"component":98},{"id":352,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"61ac58fa-1680-48cb-a2f2-63ce1c0fb014","2f91d2ee-f008-4cb3-8d3a-54f90b1e248d","Meet the team",{"url":356,"_uid":359,"label":360,"component":98},{"id":357,"url":92,"linktype":139,"fieldtype":95,"cached_url":358},"3651d250-624a-4de8-91ef-c587a5201f27","about/our-workflow","5ed0dcc2-af78-4850-a37c-43519c317d3a","Our workflow",{"url":362,"_uid":365,"label":366,"component":98},{"id":363,"url":92,"linktype":139,"fieldtype":95,"cached_url":364},"2c24df34-f6c7-45b4-bd0b-4d18825a8b73","about/diversity-and-inclusion","d8e98672-48f6-4c25-a41b-fe1e1f45225e","Diversity & inclusion",[],{"_uid":369,"label":370,"navLink":371,"navList":374,"component":249,"featuredResource":431},"a3c1ed45-b860-45f4-9cb4-a38e704df310","Insights",{"id":372,"url":92,"linktype":139,"fieldtype":95,"cached_url":373},"02b9214b-7bcc-4ca0-8043-834fb9253dfd","blog/",[375,409],{"_uid":376,"links":377,"title":408,"component":164},"78a6a878-4cfb-4164-989a-634b7c1f152e",[378,384,390,396,402],{"url":379,"_uid":382,"label":383,"component":98},{"id":380,"url":92,"linktype":139,"fieldtype":95,"cached_url":381},"454ddbdc-fc56-4ec3-a378-7ff7673c4c36","blog/topic/technology","1268be04-37df-4989-bf58-45df1811523b","Technology",{"url":385,"_uid":388,"label":389,"component":98},{"id":386,"url":92,"linktype":139,"fieldtype":95,"cached_url":387},"261330d3-0c84-4ffe-ac5b-14c150ef4d1c","blog/topic/business","428ce967-1483-4385-b728-14899f167505","Business",{"url":391,"_uid":394,"label":395,"component":98},{"id":392,"url":92,"linktype":139,"fieldtype":95,"cached_url":393},"60775fb9-433a-4ce9-bf32-14681a06aa9c","blog/topic/product-design","82f2c109-e41d-49af-a419-0fdd240e6bad","Product Design",{"url":397,"_uid":400,"label":401,"component":98},{"id":398,"url":92,"linktype":139,"fieldtype":95,"cached_url":399},"86c6dbac-ac2d-4c27-9a02-5e6bf6e52ad6","blog/topic/ai","6cbd224a-2c6b-4541-8d0b-3969f89f391c","AI",{"url":403,"_uid":406,"label":407,"component":98},{"id":404,"url":92,"linktype":139,"fieldtype":95,"cached_url":405},"d8b135db-127b-4ebb-84d0-db5585b90977","blog/topic/culture","f82bdf78-ea22-4935-a8a3-9bc56a4d487e","Culture","CATEGORIES",{"_uid":410,"links":411,"title":430,"component":164},"a38f984d-7218-4208-9714-e246f26fdf68",[412,418,424],{"url":413,"_uid":416,"label":417,"component":98},{"id":414,"url":92,"linktype":139,"fieldtype":95,"cached_url":415},"ad5b4644-8799-4e66-848f-9fece29af834","vue-js-resource-library","3201165e-9422-4db5-936a-eff87fd63055","Vue.js Resource Library",{"url":419,"_uid":422,"label":423,"component":98},{"id":420,"url":92,"linktype":139,"fieldtype":95,"cached_url":421},"a140f746-26d5-4b3d-99b1-b402bf24bb9c","services/vue-js-technology-guide","e0bd2e62-5fb5-40ac-a76c-6b3e1e6b2d9a","Vue.js Technology Guide",{"url":425,"_uid":428,"label":429,"component":98,"fontColor":92,"fontWeight":92},{"id":426,"url":92,"linktype":139,"fieldtype":95,"cached_url":427},"491e2745-d534-4eeb-ac0c-773d24ca9008","vue3-migration-guide","ec037c43-aa9e-4f7c-9dd2-8a6a5eaa763a","Vue 3 Migration Guide ","Resources",[],{"_uid":433,"label":434,"navLink":435,"navList":438,"component":249},"972bcc26-a41a-46fe-8efb-b7dfe82e2774","Careers",{"id":436,"url":92,"linktype":139,"fieldtype":95,"cached_url":437},"8f0dc7af-f9c1-44a9-a80d-89372f8cc267","careers/",[],"newNavbar","global/navbar",20,[],"a147aa3d-ca9d-4fd9-9935-7f273bd01f6c","2025-02-28T09:58:21.611Z",[],[],[],{"age":113,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":449,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":450,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":451,"x-runtime":452,"x-xss-protection":53},"W/\"5b1d5e7618ca9db1a4c33167033955b6\"","a4nvlpiBY4eapQWFpzj7xBTZmPiKj8hvq7IGbLHq2RIYM3WxHPtSyg==","c528bd92-d59a-4e21-ab8b-473bdbb603b5","0.031030",{"data":454,"headers":545},{"story":455,"cv":28,"rels":543,"links":544},{"name":456,"created_at":457,"published_at":458,"updated_at":459,"id":460,"uuid":461,"content":462,"slug":456,"full_slug":537,"sort_by_date":19,"position":538,"tag_list":539,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":540,"first_published_at":541,"release_id":19,"lang":26,"path":19,"alternates":542,"default_full_slug":19,"translated_slugs":19},"footer","2023-06-26T06:24:36.783Z","2025-04-04T10:23:27.121Z","2025-04-04T10:23:27.142Z",330572753,"4f7468eb-eab1-4b19-9888-91e9ec9a531c",{"_uid":463,"global":464,"component":102},"a1d00131-5209-43cd-8903-741b7c46d716",[465],{"_uid":466,"other":467,"component":456,"footerLinks":480,"recognitionSectionItem":498,"recognitionSectionTitle":536},"e295beac-37a2-4ff1-92ac-53c9cffc1aa7",[468,474],{"url":469,"_uid":472,"label":473,"component":98},{"id":470,"url":92,"linktype":139,"fieldtype":95,"cached_url":471},"f6d15ccb-fd0d-417c-a140-5d1615b3e032","privacy-policy","556a1806-0dce-4fef-ba6c-f0c6ae3ac7cf","Privacy policy",{"url":475,"_uid":478,"label":479,"component":98},{"id":476,"url":92,"linktype":139,"fieldtype":95,"cached_url":477},"119dd9b7-f275-4ffc-8e88-0382984a7e42","whistleblower-policy","e5174f5f-9e3f-4845-83b3-b2da9f6b7eb0","Whistleblower policy",[481,484,487,490,495],{"url":482,"_uid":483,"label":136,"component":98},{"id":138,"url":92,"linktype":139,"fieldtype":95,"cached_url":140},"37e6c270-9411-4403-b002-a2d11075de2f",{"url":485,"_uid":486,"label":253,"component":98},{"id":255,"url":92,"linktype":139,"fieldtype":95,"cached_url":256},"7d276faf-cd53-4566-8d3a-b88c07c112bc",{"url":488,"_uid":489,"label":342,"component":98},{"id":344,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"5881f50b-8789-47a5-a6c2-d4168c1c8272",{"url":491,"_uid":493,"label":494,"component":98},{"id":492,"url":92,"linktype":139,"fieldtype":95,"cached_url":373},"be5b4cc1-eeeb-4b80-8667-d5349d25caa5","ab462dd1-fc56-4b64-a408-626cedc1b075","Blog",{"url":496,"_uid":497,"label":434,"component":98},{"id":436,"url":92,"linktype":139,"fieldtype":95,"cached_url":437},"3c0be0e8-510d-4b8f-9142-27d1dc11812e",[499,510,519,528],{"_uid":500,"CTALink":501,"component":504,"imageLink":505,"imageAltText":508,"originalImageWidth":509,"originalImageHeight":509},"82efaec0-a246-40cd-bd36-4a9f7de3914b",{"id":92,"url":502,"target":503,"linktype":94,"fieldtype":95,"cached_url":502},"https://clutch.co/profile/monterail#reviews","_blank","imageWithLink",{"id":92,"url":506,"linktype":507,"fieldtype":95,"cached_url":506},"https://a.storyblok.com/f/202591/171x49/1c18b37fd6/clutch.svg","asset","Clutch recognised Monterail","173",{"_uid":511,"CTALink":512,"component":504,"imageLink":514,"imageAltText":516,"originalImageWidth":517,"originalImageHeight":518},"e6103c4a-9996-4a28-b050-2b370ae991d0",{"id":92,"url":513,"target":503,"linktype":94,"fieldtype":95,"cached_url":513},"https://vuejs.org/partners/monterail.html",{"id":92,"url":515,"linktype":507,"fieldtype":95,"cached_url":515},"https://a.storyblok.com/f/202591/170x49/db158a26a5/vue-partner.svg","Official Vue Partner","170","49",{"_uid":520,"component":521,"imageLink":522,"imageTitle":524,"imageAltText":525,"originalImageWidth":526,"originalImageHeight":527,"originalMobileImageHeight":92},"071db734-a4c1-42c4-90e8-354c487ae4d3","externalImage",{"id":92,"url":523,"linktype":507,"fieldtype":95,"cached_url":523},"https://a.storyblok.com/f/202591/99x41/e9940cc436/financial-times.svg","Financial times badge","Financial Times recognised Monterail","99","41",{"_uid":529,"component":521,"imageLink":530,"imageTitle":532,"imageAltText":533,"originalImageWidth":534,"originalImageHeight":535,"originalMobileImageHeight":92},"a7ad96fd-04c5-41ee-8edd-bb6c9e2661c4",{"id":92,"url":531,"linktype":507,"fieldtype":95,"cached_url":531},"https://a.storyblok.com/f/202591/151x29/5e4215bdb3/deloitte.svg","Deloitte badge","Deloite recognised Monterail","151","29","Recognized by","global/footer",10,[],"c7b5e344-a5c0-423a-bf5f-4c4b389396d8","2023-07-18T06:12:53.356Z",[],[],[],{"age":546,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":547,"etag":548,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":549,"x-amz-cf-id":550,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":551,"x-runtime":552,"x-xss-protection":53},"158","Thu, 16 Apr 2026 14:21:01 GMT","W/\"9de5e3273276afa3f6e7680d288d3e9f\"","1.1 e8fc5ca8beb1980902ed927d11fa6d7e.cloudfront.net (CloudFront)","ufqIjVTixlOJJKNvWj0daPYUXS7yKlYEhVaUqW2p4v4yqJKFj9hZnA==","91d02977-8fd8-4a74-bf42-1bb7b2c585b6","0.021466",{"data":554,"headers":5291,"perPage":633,"total":5300},{"stories":555,"cv":28,"rels":5289,"links":5290},[556,1198,3490],{"name":557,"created_at":558,"published_at":559,"updated_at":560,"id":561,"uuid":562,"content":563,"slug":1191,"full_slug":1192,"sort_by_date":19,"position":1193,"tag_list":1194,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":1196,"first_published_at":559,"release_id":19,"lang":26,"path":19,"alternates":1197,"default_full_slug":19,"translated_slugs":19},"Who’s Defining the New Default: Speakers’ Highlights (Part V)","2026-04-16T13:28:02.255Z","2026-04-16T13:47:47.680Z","2026-04-16T13:47:47.713Z",166528951353009,"1b10e00e-6b5e-42eb-aa22-f3e8bbd74473",{"seo":564,"_uid":571,"title":557,"Subtitle":572,"authorId":573,"postBody":574,"component":1156,"categoryIds":1157,"postSummary":1159,"featuredImage":1184,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":1190},[565],{"_uid":566,"image":567,"title":568,"noIndex":22,"component":569,"description":570,"canonicalUrl":92},"d0ad0de9-53ae-4509-89b4-5cccea1f196a",[],"Who’s Defining the New Default: Speakers’ Highlights (Part V) | Monterail blog ","seo","Explore how AI security, embodied hardware, and open-source economics define the \"New Default.\" Learn from experts redefining AI infrastructure and sovereignty.","65c3609e-76f6-4022-99a3-3a5cd57e9579",[],"da37d717-1957-47a3-827f-98feafa51262",[575],{"_uid":576,"content":577,"component":1155},"64f65237-8aad-4419-af4c-43c161eaef69",{"type":72,"content":578},[579,589,597,605,620,622,712,714,728,737,745,747,755,774,835,837,841,844,847,850,864,875,883,891,941,943,946,948,951,954,957,960,963,976,986,994,1002,1052,1054,1067,1069,1079,1087,1106,1114,1148],{"type":580,"attrs":581,"content":583},"heading",{"level":582,"textAlign":19},2,[584],{"text":585,"type":80,"marks":586},"From Wrappers to World-Models: How to Build a Physical and Secure Infrastructure for AI?",[587],{"type":83,"attrs":588},{"color":85},{"type":75,"attrs":590,"content":591},{"textAlign":19},[592],{"text":593,"type":80,"marks":594},"The architecture of the AI era is being built on three pillars: security-first engineering, embodied intelligence, and the geopolitical economics of open source. In this article we explore how practitioners we talked to, are moving beyond \"wrapper\" apps toward resilient, sovereign, and physically integrated AI systems.",[595],{"type":83,"attrs":596},{"color":85},{"type":75,"attrs":598,"content":599},{"textAlign":19},[600],{"text":601,"type":80,"marks":602},"What happens when AI moves from a chatbot window into the browser, into our glasses, and into the foundations of national policy? As the novelty of LLMs fades, the focus has shifted to the \"boring\" but critical work of making these systems safe, sustainable, and physically useful.",[603],{"type":83,"attrs":604},{"color":85},{"type":75,"attrs":606,"content":607},{"textAlign":19},[608,615],{"text":609,"type":80,"marks":610},"The New Default",[611,613],{"type":83,"attrs":612},{"color":85},{"type":614},"italic",{"text":616,"type":80,"marks":617}," speaker series examines the infrastructure required to support a world where AI agents act on our behalf, and hardware finally catches up to software's intelligence.",[618],{"type":83,"attrs":619},{"color":85},{"type":75,"attrs":621},{"textAlign":19},{"type":623,"attrs":624},"blok",{"id":625,"body":626},"aafb9f04-4e3a-4752-9cbd-51fcc8407b65",[627],{"_uid":628,"quote":629,"fontSize":709,"component":710,"accentColor":711},"i-66a34f9e-9d68-4066-8acd-f8a845d7214a",{"type":72,"content":630},[631,641],{"type":580,"attrs":632,"content":634},{"level":633,"textAlign":19},3,[635],{"text":636,"type":80,"marks":637},"Key Takeaways:",[638,640],{"type":83,"attrs":639},{"color":85},{"type":99},{"type":642,"content":643},"bullet_list",[644,661,677,693],{"type":645,"content":646},"list_item",[647],{"type":75,"attrs":648,"content":649},{"textAlign":19},[650,656],{"text":651,"type":80,"marks":652},"Security is the new feature.",[653,655],{"type":83,"attrs":654},{"color":85},{"type":99},{"text":657,"type":80,"marks":658}," AI agents operating in browsers introduce \"agentic attack\" surfaces that require defensive guardrails and rigorous testing frameworks like Spikee.",[659],{"type":83,"attrs":660},{"color":85},{"type":645,"content":662},[663],{"type":75,"attrs":664,"content":665},{"textAlign":19},[666,672],{"text":667,"type":80,"marks":668},"Embodiment over Immersion.",[669,671],{"type":83,"attrs":670},{"color":85},{"type":99},{"text":673,"type":80,"marks":674}," The future of AI hardware lies in \"AI glasses\" that augment reality through audio and context, rather than VR headsets that replace it.",[675],{"type":83,"attrs":676},{"color":85},{"type":645,"content":678},[679],{"type":75,"attrs":680,"content":681},{"textAlign":19},[682,688],{"text":683,"type":80,"marks":684},"Open Source is a Spectrum.",[685,687],{"type":83,"attrs":686},{"color":85},{"type":99},{"text":689,"type":80,"marks":690}," Open-source AI is rarely a purely altruistic act; it is often a strategic \"national bet\" or a way to commoditize complements.",[691],{"type":83,"attrs":692},{"color":85},{"type":645,"content":694},[695],{"type":75,"attrs":696,"content":697},{"textAlign":19},[698,704],{"text":699,"type":80,"marks":700},"Data Sovereignty is National Security.",[701,703],{"type":83,"attrs":702},{"color":85},{"type":99},{"text":705,"type":80,"marks":706}," AI sovereignty is becoming a core component of digital policy, moving from corporate competition to national interest.",[707],{"type":83,"attrs":708},{"color":85},"text-24 md:text-26","quoteBlock","purple",{"type":580,"attrs":713},{"level":633,"textAlign":19},{"type":75,"attrs":715,"content":716},{"textAlign":19},[717],{"type":718,"attrs":719,"marks":723},"image",{"id":720,"alt":92,"src":721,"title":92,"source":92,"copyright":92,"meta_data":722},21599167,"https://a.storyblok.com/f/202591/1200x694/ad054351ad/ai-software-development.png",{},[724],{"type":98,"attrs":725},{"href":726,"uuid":19,"anchor":19,"target":727,"linktype":94},"https://www.monterail.com/services/artificial-intelligence-development-services","_self",{"type":580,"attrs":729,"content":730},{"level":582,"textAlign":19},[731],{"text":732,"type":80,"marks":733},"Beyond the Hype: How Security, Hardware, and Geopolitics are Shaping the Next Era of AI",[734,736],{"type":83,"attrs":735},{"color":85},{"type":99},{"type":75,"attrs":738,"content":739},{"textAlign":19},[740],{"text":741,"type":80,"marks":742},"The New Default is about the structural integrity of the systems that host the chatbots. As we move away from simple API wrappers and toward deep integration, the conversation has shifted toward the heavy lifting of engineering. We sat down with three experts who are redefining these boundaries: exploring how to secure autonomous agents that navigate the web, how to move AI out of the screen and into wearable hardware, and how the \"national bet\" on open-source models is reshaping global digital sovereignty.",[743],{"type":83,"attrs":744},{"color":85},{"type":75,"attrs":746},{"textAlign":19},{"type":580,"attrs":748,"content":749},{"level":582,"textAlign":19},[750],{"text":751,"type":80,"marks":752},"Donato Capitella: The Security Architect of Agentic AI",[753],{"type":83,"attrs":754},{"color":85},{"type":75,"attrs":756,"content":757},{"textAlign":19},[758,763,769],{"text":759,"type":80,"marks":760},"Donato Capitella, a leading voice in AI security, focuses on the \"agentic\" shift, where AI doesn't just talk, but ",[761],{"type":83,"attrs":762},{"color":85},{"text":764,"type":80,"marks":765},"acts",[766,768],{"type":83,"attrs":767},{"color":85},{"type":614},{"text":770,"type":80,"marks":771},". As we give LLMs the power to browse the web and execute code, we open a Pandora's box of browser-based vulnerabilities. Here are the areas Donato expanded in our talks: ",[772],{"type":83,"attrs":773},{"color":85},{"type":642,"content":775},[776,792,808],{"type":645,"content":777},[778],{"type":75,"attrs":779,"content":780},{"textAlign":19},[781,787],{"text":782,"type":80,"marks":783},"LLM Guardrails as Infrastructure:",[784,786],{"type":83,"attrs":785},{"color":85},{"type":99},{"text":788,"type":80,"marks":789}," Donato argues that guardrails shouldn't be an afterthought. They are the essential filtering layer that prevents prompt injection and ensures model outputs remain within safe operational bounds.",[790],{"type":83,"attrs":791},{"color":85},{"type":645,"content":793},[794],{"type":75,"attrs":795,"content":796},{"textAlign":19},[797,803],{"text":798,"type":80,"marks":799},"The Browser-Based Agentic Attack:",[800,802],{"type":83,"attrs":801},{"color":85},{"type":99},{"text":804,"type":80,"marks":805}," He warns of a new class of threats where AI agents can be manipulated by the very websites they browse. An agent tasked with \"summarizing a page\" might be tricked by hidden text into \"deleting the user's account,\" requiring a fundamental rethink of web security.",[806],{"type":83,"attrs":807},{"color":85},{"type":645,"content":809},[810],{"type":75,"attrs":811,"content":812},{"textAlign":19},[813,819,824,830],{"text":814,"type":80,"marks":815},"Spikee: Testing for Non-Determinism:",[816,818],{"type":83,"attrs":817},{"color":85},{"type":99},{"text":820,"type":80,"marks":821}," To solve this, Donato introduces ",[822],{"type":83,"attrs":823},{"color":85},{"text":825,"type":80,"marks":826},"Spikee",[827,829],{"type":83,"attrs":828},{"color":85},{"type":99},{"text":831,"type":80,"marks":832},", a testing framework designed specifically for the unpredictable nature of LLMs, allowing developers to stress-test agentic workflows before they hit production.",[833],{"type":83,"attrs":834},{"color":85},{"type":75,"attrs":836},{"textAlign":19},{"type":623,"attrs":838},{"id":839,"body":840},"e6d2c75f-e4bd-4688-b739-7d088e28afee",[],{"type":623,"attrs":842},{"id":839,"body":843},[],{"type":623,"attrs":845},{"id":839,"body":846},[],{"type":623,"attrs":848},{"id":839,"body":849},[],{"type":623,"attrs":851},{"id":625,"body":852},[853],{"_uid":854,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":856,"placeholderText":92,"placeholderImage":857},"i-e48320dc-1f65-414f-9288-f6a049ca4168","embededVideoSection","https://www.youtube.com/embed/6mixCpOp3YI?si=HIgBX4wpHtIuqBiJ",[858],{"_uid":859,"component":521,"imageLink":860,"imageAltText":862,"mobileImageLink":863,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"ede1074c-e6e0-4f28-a2ce-48cc84743777",{"id":92,"url":861,"linktype":507,"fieldtype":95,"cached_url":861},"https://a.storyblok.com/f/202591/1280x720/62f326ddbc/llm-applications-guardrails-donato.png","llm applications guardrails",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":865,"content":866},"blockquote",[867],{"type":75,"attrs":868,"content":869},{"textAlign":19},[870],{"text":871,"type":80,"marks":872},"\"The output of the LLM is untrusted input into your system. You need to treat the output of any LLM as if it came from an untrusted source.\" ",[873],{"type":83,"attrs":874},{"color":85},{"type":580,"attrs":876,"content":877},{"level":582,"textAlign":19},[878],{"text":879,"type":80,"marks":880},"Bobak Tavangar: Hardware, Software, and the Vision of Embodied AI",[881],{"type":83,"attrs":882},{"color":85},{"type":75,"attrs":884,"content":885},{"textAlign":19},[886],{"text":887,"type":80,"marks":888},"Bobak Tavangar, Co-founder and CEO of Brilliant Labs, brings a contrarian perspective to the \"AI in a box\" trend. His vision centers on how AI can finally bridge the gap between digital intelligence and physical experience. Here’s what you can lear from Bobak:",[889],{"type":83,"attrs":890},{"color":85},{"type":642,"content":892},[893,909,925],{"type":645,"content":894},[895],{"type":75,"attrs":896,"content":897},{"textAlign":19},[898,904],{"text":899,"type":80,"marks":900},"AI Glasses vs. VR:",[901,903],{"type":83,"attrs":902},{"color":85},{"type":99},{"text":905,"type":80,"marks":906}," While the tech world chases high-fidelity VR graphics, Bobak makes the case for AI glasses. His argument? We don't need to be transported to another world; we need our current world to be smarter. AI glasses provide a \"heads-up\" interface where intelligence is felt through context and audio rather than just pixels.",[907],{"type":83,"attrs":908},{"color":85},{"type":645,"content":910},[911],{"type":75,"attrs":912,"content":913},{"textAlign":19},[914,920],{"text":915,"type":80,"marks":916},"Embodiment and Technical Architecture:",[917,919],{"type":83,"attrs":918},{"color":85},{"type":99},{"text":921,"type":80,"marks":922}," Bobak highlights that true AI embodiment requires a tight loop between hardware and software. The \"New Default\" for hardware is a system that isn't just a peripheral but a sensory extension of the AI model itself.",[923],{"type":83,"attrs":924},{"color":85},{"type":645,"content":926},[927],{"type":75,"attrs":928,"content":929},{"textAlign":19},[930,936],{"text":931,"type":80,"marks":932},"Community-Driven Hardware:",[933,935],{"type":83,"attrs":934},{"color":85},{"type":99},{"text":937,"type":80,"marks":938}," He emphasizes that the most resilient technical architectures are those built in collaboration with developer communities, advocating for open-source hardware that allows for rapid iteration and \"embodied\" experimentation.",[939],{"type":83,"attrs":940},{"color":85},{"type":75,"attrs":942},{"textAlign":19},{"type":623,"attrs":944},{"id":839,"body":945},[],{"type":75,"attrs":947},{"textAlign":19},{"type":623,"attrs":949},{"id":839,"body":950},[],{"type":623,"attrs":952},{"id":839,"body":953},[],{"type":623,"attrs":955},{"id":839,"body":956},[],{"type":623,"attrs":958},{"id":839,"body":959},[],{"type":623,"attrs":961},{"id":839,"body":962},[],{"type":623,"attrs":964},{"id":625,"body":965},[966],{"_uid":967,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":968,"placeholderText":92,"placeholderImage":969},"i-90610cc7-8560-4516-a25b-2a8369ade72d","https://www.youtube.com/embed/P4qu2gvrMi4?si=tTRcpZem2notgnQn",[970],{"_uid":971,"component":521,"imageLink":972,"imageAltText":974,"mobileImageLink":975,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"c2db670f-9d49-4a74-8c9a-1ad3a258de1c",{"id":92,"url":973,"linktype":507,"fieldtype":95,"cached_url":973},"https://a.storyblok.com/f/202591/1280x720/a25c36fb8b/bobak-ai-glasses.png","AI Glasses not vr graphics",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":865,"content":977},[978],{"type":75,"attrs":979,"content":980},{"textAlign":19},[981],{"text":982,"type":80,"marks":983},"The glasses don't render new worlds. They try to understand the one you are actually in... it's sort of the best form factor for giving an AI agent a front row seat to that life.",[984],{"type":83,"attrs":985},{"color":85},{"type":580,"attrs":987,"content":988},{"level":582,"textAlign":19},[989],{"text":990,"type":80,"marks":991},"Elizabeth Seger: The Geopolitics and Economics of Open AI",[992],{"type":83,"attrs":993},{"color":85},{"type":75,"attrs":995,"content":996},{"textAlign":19},[997],{"text":998,"type":80,"marks":999},"Elizabeth Seger, a specialist in AI ethics and digital policy, shifts the lens toward the macro-scale. She explores why \"open source\" has become the primary battleground for AI dominance. Here are Elisabeth’s insights on the safety and economics of Open AI:",[1000],{"type":83,"attrs":1001},{"color":85},{"type":642,"content":1003},[1004,1020,1036],{"type":645,"content":1005},[1006],{"type":75,"attrs":1007,"content":1008},{"textAlign":19},[1009,1015],{"text":1010,"type":80,"marks":1011},"The Economics of \"Free\":",[1012,1014],{"type":83,"attrs":1013},{"color":85},{"type":99},{"text":1016,"type":80,"marks":1017}," Elizabeth demystifies the open-source movement, noting that companies often open-source models to commoditize complementary products (like compute or cloud services). It is a strategic play to set the industry standard and prevent vendor lock-in by competitors.",[1018],{"type":83,"attrs":1019},{"color":85},{"type":645,"content":1021},[1022],{"type":75,"attrs":1023,"content":1024},{"textAlign":19},[1025,1031],{"text":1026,"type":80,"marks":1027},"AI Sovereignty and the National Bet:",[1028,1030],{"type":83,"attrs":1029},{"color":85},{"type":99},{"text":1032,"type":80,"marks":1033}," She introduces the concept of AI sovereignty—the idea that nations must own or control their AI infrastructure to ensure economic and security independence. For many countries, investing in open-source AI is a \"national bet\" against the hegemony of a few private tech giants.",[1034],{"type":83,"attrs":1035},{"color":85},{"type":645,"content":1037},[1038],{"type":75,"attrs":1039,"content":1040},{"textAlign":19},[1041,1047],{"text":1042,"type":80,"marks":1043},"Regulation as a Safety Floor:",[1044,1046],{"type":83,"attrs":1045},{"color":85},{"type":99},{"text":1048,"type":80,"marks":1049}," Elizabeth argues that while innovation moves fast, regulation provides the necessary safety floor. The next phase of AI development will be defined by how well we balance the \"democratization\" of open source with the \"guardrails\" required to prevent systemic risks.",[1050],{"type":83,"attrs":1051},{"color":85},{"type":75,"attrs":1053},{"textAlign":19},{"type":623,"attrs":1055},{"id":839,"body":1056},[1057],{"_uid":1058,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":1059,"placeholderText":92,"placeholderImage":1060},"i-7614efb7-c17c-4378-a90d-967d50adfa3b","https://www.youtube.com/embed/9d29to37eiE?si=KjTrxkTy73mGk5bi",[1061],{"_uid":1062,"component":521,"imageLink":1063,"imageAltText":1065,"mobileImageLink":1066,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"2d4d6a02-b156-4b86-a969-d6f6ca207817",{"id":92,"url":1064,"linktype":507,"fieldtype":95,"cached_url":1064},"https://a.storyblok.com/f/202591/1280x720/1017708619/the-economics-of-open-ai.png","the economics of open AI",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":75,"attrs":1068},{"textAlign":19},{"type":865,"content":1070},[1071],{"type":75,"attrs":1072,"content":1073},{"textAlign":19},[1074],{"text":1075,"type":80,"marks":1076},"If there's something you develop that you really want to drive a market demand for, one way to drive that market demand is to make the compliment to that product completely free... You commoditize the compliment to the products you really want to sell.",[1077],{"type":83,"attrs":1078},{"color":85},{"type":580,"attrs":1080,"content":1081},{"level":582,"textAlign":19},[1082],{"text":1083,"type":80,"marks":1084},"Why the AI Advantage Belongs to the Architects",[1085],{"type":83,"attrs":1086},{"color":85},{"type":75,"attrs":1088,"content":1089},{"textAlign":19},[1090,1095,1101],{"text":1091,"type":80,"marks":1092},"The insights from Donato, Bobak, and Elizabeth point to a singular conclusion: the \"New Default\" isn't just about using AI; it's about ",[1093],{"type":83,"attrs":1094},{"color":85},{"text":1096,"type":80,"marks":1097},"owning the architecture",[1098,1100],{"type":83,"attrs":1099},{"color":85},{"type":99},{"text":1102,"type":80,"marks":1103},". We are moving past the era of the \"magic trick\" and into the era of the \"utility.\" The \"New Default\" dictates that the true competitive advantage no longer lies in the ability to write a clever prompt, but in the capability to architect the bedrock beneath it. ",[1104],{"type":83,"attrs":1105},{"color":85},{"type":75,"attrs":1107,"content":1108},{"textAlign":19},[1109],{"text":1110,"type":80,"marks":1111},"Whether it is securing the digital pathways of autonomous agents, weaving intelligence into the physical fabric of our daily wear, or navigating the high-stakes chess match of global AI economics, the focus has shifted from what AI can say to what it can do safely and reliably. In this new epoch, the winners won't be those who merely consume AI, but the architects who build the resilient, embodied, and sovereign systems that allow it to finally inhabit our world.",[1112],{"type":83,"attrs":1113},{"color":85},{"type":75,"attrs":1115,"content":1116},{"textAlign":19},[1117,1123,1132,1142],{"text":1118,"type":80,"marks":1119},"Explore the full interviews and deep dives at",[1120,1122],{"type":83,"attrs":1121},{"color":85},{"type":614},{"text":1124,"type":80,"marks":1125}," ",[1126,1129,1131],{"type":98,"attrs":1127},{"href":1128,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.thenewdefault.com/",{"type":83,"attrs":1130},{"color":85},{"type":614},{"text":609,"type":80,"marks":1133},[1134,1136,1139,1140],{"type":98,"attrs":1135},{"href":1128,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1137},{"color":1138},"#1155CC",{"type":614},{"type":1141},"underline",{"text":1143,"type":80,"marks":1144},".",[1145,1147],{"type":83,"attrs":1146},{"color":85},{"type":614},{"type":623,"attrs":1149},{"id":839,"body":1150},[1151],{"_uid":1152,"margin":1153,"component":1154},"i-fc427883-b8a2-40e5-ac5c-8c4cca11cb2e","24px","BlogSpacer","richTextRenderer","Blog Post Page",[398,386,1158,380],"a58784aa-4408-4d4b-b406-e04bee5078c2",{"type":72,"content":1160},[1161],{"type":75,"attrs":1162,"content":1163},{"textAlign":19},[1164,1166,1170,1172,1176,1178,1182],{"text":1165,"type":80},"Explore the transition from AI \"wrappers\" to resilient, world-model architectures in this expert-led deep dive. Learn how ",{"text":1167,"type":80,"marks":1168},"Donato Capitella",[1169],{"type":99},{"text":1171,"type":80}," (Security), ",{"text":1173,"type":80,"marks":1174},"Bobak Tavangar",[1175],{"type":99},{"text":1177,"type":80}," (Embodied AI), and ",{"text":1179,"type":80,"marks":1180},"Elizabeth Seger",[1181],{"type":99},{"text":1183,"type":80}," (Digital Policy) are defining the \"New Default\" through security-first engineering, wearable AI hardware, and the geopolitical shift toward AI sovereignty. Discover why the future of competitive advantage lies not in prompting, but in building the physical and secure infrastructure that allows AI to move from the chatbot window into the real world.",[1185],{"_uid":1186,"component":521,"imageLink":1187,"imageAltText":557,"mobileImageLink":1189,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"6497a462-5b69-4cfa-890d-a74dec4b38ac",{"id":92,"url":1188,"linktype":507,"fieldtype":95,"cached_url":1188},"https://a.storyblok.com/f/202591/2496x1696/6982f391f4/who-s-defining-the-new-default-speakers-highlights.png",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"who-s-defining-the-new-default-speakers-highlights-part-5","blog/who-s-defining-the-new-default-speakers-highlights-part-5",-7330,[],451289887,"782ce54b-5b59-4508-8e23-876950187ab7",[],{"name":1199,"created_at":1200,"published_at":1201,"updated_at":1202,"id":1203,"uuid":1204,"content":1205,"slug":3484,"full_slug":3485,"sort_by_date":19,"position":3486,"tag_list":3487,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":3488,"first_published_at":1201,"release_id":19,"lang":26,"path":19,"alternates":3489,"default_full_slug":19,"translated_slugs":19},"How To Create a Product Redesign Scope Template (with templates and examples)","2026-04-14T17:58:51.917Z","2026-04-14T18:06:41.810Z","2026-04-14T18:06:41.839Z",165887721170367,"886c7620-b208-4a0d-afa9-a809dede4503",{"seo":1206,"_uid":1217,"title":1199,"Subtitle":1218,"authorId":1219,"postBody":1220,"component":1156,"categoryIds":3472,"postSummary":3475,"featuredImage":3478,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":3483},[1207],{"_uid":1208,"image":1209,"title":1199,"noIndex":22,"component":569,"description":1216,"canonicalUrl":92},"531da741-6ae5-4022-8fc4-100735ed4f46",[1210],{"_uid":1211,"component":521,"imageLink":1212,"imageAltText":1214,"mobileImageLink":1215,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"b65e9518-35e4-4472-ba70-ea3fbdf707f5",{"id":92,"url":1213,"linktype":507,"fieldtype":95,"cached_url":1213},"https://a.storyblok.com/f/202591/2482x1696/c6ea32a40a/gemini_generated_image_rfi7gsrfi7gsrfi7.png","Abstract image representing the concept of a redesign project scope document.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"A product redesign scope template defines the boundaries, goals, deliverables, and success metrics for a redesign project. ","e483019a-fc60-44e9-ba4a-203f148c99e4",[],"de23d188-a323-4cf3-b0b5-d083b10d094a",[1221],{"_uid":1222,"content":1223,"component":1155},"5a4c76bf-ca6d-4180-bed8-3faf3c4e55b1",{"type":72,"content":1224},[1225,1243,1251,1259,1281,1287,1295,1303,1353,1375,1416,1421,1429,1437,1446,1454,1462,1484,1492,1500,1508,1530,1538,1560,1565,1573,1581,1589,1597,1647,1666,1674,1682,1690,1767,1787,1795,1803,1812,1844,1879,1887,1906,1915,1947,1956,1988,1996,2032,2040,2048,2062,2076,2097,2105,2113,2163,2184,2192,2200,2266,2274,2282,2477,2485,2493,2501,2567,2572,2580,2588,2765,2773,2808,2813,2821,2829,2837,2915,2923,2943,2951,2991,2999,3077,3082,3090,3098,3119,3127,3148,3156,3177,3185,3206,3214,3222,3230,3238,3243,3251],{"type":865,"content":1226},[1227],{"type":75,"attrs":1228,"content":1229},{"textAlign":19},[1230,1237],{"text":1231,"type":80,"marks":1232},"TL;DR: ",[1233,1235,1236],{"type":83,"attrs":1234},{"color":85},{"type":99},{"type":614},{"text":1238,"type":80,"marks":1239},"A product redesign scope template defines the boundaries, goals, deliverables, and success metrics for a redesign project. It keeps teams focused, prevents scope creep, and gives stakeholders the context they need to say \"yes.\" Key sections include: project background, objectives, in-scope and out-of-scope features, deliverables, timeline, risks, and success metrics. ",[1240,1242],{"type":83,"attrs":1241},{"color":85},{"type":614},{"type":75,"attrs":1244,"content":1245},{"textAlign":19},[1246],{"text":1247,"type":80,"marks":1248},"Every product eventually needs a redesign. Maybe your conversion rates are slipping, users are frustrated with the navigation, or your interface just looks like it time-traveled from 2016. Whatever the reason, jumping straight into pixels and prototypes without a clear scope is one of the fastest ways to derail a redesign project.",[1249],{"type":83,"attrs":1250},{"color":85},{"type":75,"attrs":1252,"content":1253},{"textAlign":19},[1254],{"text":1255,"type":80,"marks":1256},"A product redesign scope template is the document that keeps everyone aligned on what you're redesigning, why you're redesigning it, and how you'll know when it's done. Designers and developers, stakeholders and executives, all on the same page.",[1257],{"type":83,"attrs":1258},{"color":85},{"type":75,"attrs":1260,"content":1261},{"textAlign":19},[1262,1267,1276],{"text":1263,"type":80,"marks":1264},"In this guide, we'll walk through everything that goes into a ",[1265],{"type":83,"attrs":1266},{"color":85},{"text":1268,"type":80,"marks":1269},"solid product redesign",[1270,1273,1275],{"type":98,"attrs":1271},{"href":1272,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/services/product-design-services/ux-ui-design",{"type":83,"attrs":1274},{"color":1138},{"type":1141},{"text":1277,"type":80,"marks":1278}," scope document, share free templates you can start using today, and cover practical tips from designers who've been through large-scale redesigns.",[1279],{"type":83,"attrs":1280},{"color":85},{"type":623,"attrs":1282},{"id":1283,"body":1284},"78fadce4-8c3d-4091-8e36-01ef834c4b91",[1285],{"_uid":1286,"margin":1153,"component":1154},"i-575c2f67-c7db-48ee-ac68-0a55cd2ad6d4",{"type":580,"attrs":1288,"content":1289},{"level":582,"textAlign":19},[1290],{"text":1291,"type":80,"marks":1292},"What is a product redesign scope?",[1293],{"type":83,"attrs":1294},{"color":85},{"type":75,"attrs":1296,"content":1297},{"textAlign":19},[1298],{"text":1299,"type":80,"marks":1300},"A product redesign scope is a document that defines the boundaries of a redesign project. It answers three fundamental questions:",[1301],{"type":83,"attrs":1302},{"color":85},{"type":642,"content":1304},[1305,1321,1337],{"type":645,"content":1306},[1307],{"type":75,"attrs":1308,"content":1309},{"textAlign":19},[1310,1316],{"text":1311,"type":80,"marks":1312},"What are we changing?",[1313,1315],{"type":83,"attrs":1314},{"color":85},{"type":99},{"text":1317,"type":80,"marks":1318}," Which parts of the product are being redesigned, and which are staying as they are?",[1319],{"type":83,"attrs":1320},{"color":85},{"type":645,"content":1322},[1323],{"type":75,"attrs":1324,"content":1325},{"textAlign":19},[1326,1332],{"text":1327,"type":80,"marks":1328},"Why are we changing it?",[1329,1331],{"type":83,"attrs":1330},{"color":85},{"type":99},{"text":1333,"type":80,"marks":1334}," What business problem, user pain point, or strategic goal is driving the redesign?",[1335],{"type":83,"attrs":1336},{"color":85},{"type":645,"content":1338},[1339],{"type":75,"attrs":1340,"content":1341},{"textAlign":19},[1342,1348],{"text":1343,"type":80,"marks":1344},"What does \"done\" look like?",[1345,1347],{"type":83,"attrs":1346},{"color":85},{"type":99},{"text":1349,"type":80,"marks":1350}," What are the specific deliverables, milestones, and success metrics?",[1351],{"type":83,"attrs":1352},{"color":85},{"type":75,"attrs":1354,"content":1355},{"textAlign":19},[1356,1361,1370],{"text":1357,"type":80,"marks":1358},"Think of it as a contract between ",[1359],{"type":83,"attrs":1360},{"color":85},{"text":1362,"type":80,"marks":1363},"the design team",[1364,1367,1369],{"type":98,"attrs":1365},{"href":1366,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/services/product-design",{"type":83,"attrs":1368},{"color":1138},{"type":1141},{"text":1371,"type":80,"marks":1372}," and the rest of the organization. Without one, redesign projects tend to expand in unpredictable ways -- a homepage refresh turns into a full navigation overhaul, which turns into a design system rebuild, which turns into six months of missed deadlines and frustrated stakeholders.",[1373],{"type":83,"attrs":1374},{"color":85},{"type":75,"attrs":1376,"content":1377},{"textAlign":19},[1378,1383,1389,1394,1400,1405,1411],{"text":1379,"type":80,"marks":1380},"The scope document is sometimes called a ",[1381],{"type":83,"attrs":1382},{"color":85},{"text":1384,"type":80,"marks":1385},"product redesign brief",[1386,1388],{"type":83,"attrs":1387},{"color":85},{"type":99},{"text":1390,"type":80,"marks":1391},", a ",[1392],{"type":83,"attrs":1393},{"color":85},{"text":1395,"type":80,"marks":1396},"design scope statement",[1397,1399],{"type":83,"attrs":1398},{"color":85},{"type":99},{"text":1401,"type":80,"marks":1402},", or a ",[1403],{"type":83,"attrs":1404},{"color":85},{"text":1406,"type":80,"marks":1407},"project scope document",[1408,1410],{"type":83,"attrs":1409},{"color":85},{"type":99},{"text":1412,"type":80,"marks":1413},". The terminology varies across teams and industries, but the purpose is the same: define the work before the work begins.",[1414],{"type":83,"attrs":1415},{"color":85},{"type":623,"attrs":1417},{"id":1283,"body":1418},[1419],{"_uid":1420,"margin":1153,"component":1154},"i-4ed27a11-7fb1-4b52-9cf0-dab779edb190",{"type":580,"attrs":1422,"content":1423},{"level":582,"textAlign":19},[1424],{"text":1425,"type":80,"marks":1426},"Why you need a product redesign scope document",[1427],{"type":83,"attrs":1428},{"color":85},{"type":75,"attrs":1430,"content":1431},{"textAlign":19},[1432],{"text":1433,"type":80,"marks":1434},"You might be tempted to skip the scoping phase and jump straight into design. After all, the problems are obvious, right? Here's why that almost never works:",[1435],{"type":83,"attrs":1436},{"color":85},{"type":580,"attrs":1438,"content":1439},{"level":633,"textAlign":19},[1440],{"text":1441,"type":80,"marks":1442},"It prevents scope creep",[1443],{"type":83,"attrs":1444},{"color":1445},"#434343",{"type":75,"attrs":1447,"content":1448},{"textAlign":19},[1449],{"text":1450,"type":80,"marks":1451},"Scope creep is the silent killer of redesign projects. Without clear boundaries, every stakeholder meeting introduces new \"nice-to-have\" features that quietly become must-haves. A well-defined scope gives you something concrete to point to when someone asks, \"Can we also redesign the settings page while we're at it?\"",[1452],{"type":83,"attrs":1453},{"color":85},{"type":580,"attrs":1455,"content":1456},{"level":633,"textAlign":19},[1457],{"text":1458,"type":80,"marks":1459},"It aligns stakeholders early",[1460],{"type":83,"attrs":1461},{"color":1445},{"type":75,"attrs":1463,"content":1464},{"textAlign":19},[1465,1470,1479],{"text":1466,"type":80,"marks":1467},"As ",[1468],{"type":83,"attrs":1469},{"color":85},{"text":1471,"type":80,"marks":1472},"Nick Babich writes on UXPlanet",[1473,1476,1478],{"type":98,"attrs":1474},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://uxplanet.org/product-redesign-proposal-structure-tips-0aa86aedaacf",{"type":83,"attrs":1477},{"color":1138},{"type":1141},{"text":1480,"type":80,"marks":1481},", \"When proposing redesign to stakeholders, you should prepare a document that will create a proper context for them and provide answers to the most common questions they likely have.\" A scope document gets everyone on the same page before a single wireframe is drawn.",[1482],{"type":83,"attrs":1483},{"color":85},{"type":580,"attrs":1485,"content":1486},{"level":633,"textAlign":19},[1487],{"text":1488,"type":80,"marks":1489},"It forces you to define success",[1490],{"type":83,"attrs":1491},{"color":1445},{"type":75,"attrs":1493,"content":1494},{"textAlign":19},[1495],{"text":1496,"type":80,"marks":1497},"Vague goals like \"improve the user experience\" or \"make it more modern\" are almost impossible to measure. A scope document requires you to define specific, measurable outcomes -- like reducing checkout abandonment by 15% or cutting support tickets related to navigation by 20%.",[1498],{"type":83,"attrs":1499},{"color":85},{"type":580,"attrs":1501,"content":1502},{"level":633,"textAlign":19},[1503],{"text":1504,"type":80,"marks":1505},"It's a negotiation tool",[1506],{"type":83,"attrs":1507},{"color":1445},{"type":75,"attrs":1509,"content":1510},{"textAlign":19},[1511,1516,1525],{"text":1512,"type":80,"marks":1513},"Project timelines proposed by executives rarely match reality. As one project management expert ",[1514],{"type":83,"attrs":1515},{"color":85},{"text":1517,"type":80,"marks":1518},"explains",[1519,1522,1524],{"type":98,"attrs":1520},{"href":1521,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.youtube.com/watch?v=5OkIqlJFCBE",{"type":83,"attrs":1523},{"color":1138},{"type":1141},{"text":1526,"type":80,"marks":1527},", having a documented scope with a high-level timeline is \"an awesome negotiation tool\" that lets you push back on unrealistic deadlines with evidence rather than opinions.",[1528],{"type":83,"attrs":1529},{"color":85},{"type":580,"attrs":1531,"content":1532},{"level":633,"textAlign":19},[1533],{"text":1534,"type":80,"marks":1535},"It protects the team",[1536],{"type":83,"attrs":1537},{"color":1445},{"type":75,"attrs":1539,"content":1540},{"textAlign":19},[1541,1546,1555],{"text":1542,"type":80,"marks":1543},"Redesign projects can be politically charged. As one experienced designer ",[1544],{"type":83,"attrs":1545},{"color":85},{"text":1547,"type":80,"marks":1548},"put it on Reddit",[1549,1552,1554],{"type":98,"attrs":1550},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.reddit.com/r/UXDesign/comments/1mcpoif/how_do_you_handle_a_full_redesign_after_a_major/",{"type":83,"attrs":1553},{"color":1138},{"type":1141},{"text":1556,"type":80,"marks":1557},", \"People lose metaphorical limbs in these types of projects because they can be political battles dressed up as 'transformation' and/or 'modernization.' Proceed with caution, do your due diligence, invest in stakeholder management upfront.\" A written scope document is your due diligence.",[1558],{"type":83,"attrs":1559},{"color":85},{"type":623,"attrs":1561},{"id":1283,"body":1562},[1563],{"_uid":1564,"margin":1153,"component":1154},"i-8d894834-4a4f-42ba-ac0e-adf400145e16",{"type":580,"attrs":1566,"content":1567},{"level":582,"textAlign":19},[1568],{"text":1569,"type":80,"marks":1570},"What to include in your product redesign scope template",[1571],{"type":83,"attrs":1572},{"color":85},{"type":75,"attrs":1574,"content":1575},{"textAlign":19},[1576],{"text":1577,"type":80,"marks":1578},"A comprehensive product redesign scope document covers nine key areas. Here's what each section should contain and why it matters.",[1579],{"type":83,"attrs":1580},{"color":85},{"type":580,"attrs":1582,"content":1583},{"level":633,"textAlign":19},[1584],{"text":1585,"type":80,"marks":1586},"1. Project overview and background",[1587],{"type":83,"attrs":1588},{"color":1445},{"type":75,"attrs":1590,"content":1591},{"textAlign":19},[1592],{"text":1593,"type":80,"marks":1594},"Start with the basics: what is this project, and why does it exist?",[1595],{"type":83,"attrs":1596},{"color":85},{"type":642,"content":1598},[1599,1615,1631],{"type":645,"content":1600},[1601],{"type":75,"attrs":1602,"content":1603},{"textAlign":19},[1604,1610],{"text":1605,"type":80,"marks":1606},"Project name",[1607,1609],{"type":83,"attrs":1608},{"color":85},{"type":99},{"text":1611,"type":80,"marks":1612}," -- Even a simple working title keeps everyone referring to the same initiative.",[1613],{"type":83,"attrs":1614},{"color":85},{"type":645,"content":1616},[1617],{"type":75,"attrs":1618,"content":1619},{"textAlign":19},[1620,1626],{"text":1621,"type":80,"marks":1622},"Project manager and product owner",[1623,1625],{"type":83,"attrs":1624},{"color":85},{"type":99},{"text":1627,"type":80,"marks":1628}," -- Who's accountable for delivery, and who owns the product decisions?",[1629],{"type":83,"attrs":1630},{"color":85},{"type":645,"content":1632},[1633],{"type":75,"attrs":1634,"content":1635},{"textAlign":19},[1636,1642],{"text":1637,"type":80,"marks":1638},"Background and rationale",[1639,1641],{"type":83,"attrs":1640},{"color":85},{"type":99},{"text":1643,"type":80,"marks":1644}," -- Why are we redesigning? Be specific. \"Low conversion rates on mobile checkout,\" \"user feedback consistently flags confusing navigation,\" or \"brand refresh following acquisition\" are all valid reasons. Avoid vague justifications like \"it's time for a refresh.\"",[1645],{"type":83,"attrs":1646},{"color":85},{"type":75,"attrs":1648,"content":1649},{"textAlign":19},[1650,1655,1661],{"text":1651,"type":80,"marks":1652},"The background section is critical because, as the project management saying goes, it lets people understand ",[1653],{"type":83,"attrs":1654},{"color":85},{"text":1656,"type":80,"marks":1657},"why they're doing what they're doing",[1658,1660],{"type":83,"attrs":1659},{"color":85},{"type":614},{"text":1662,"type":80,"marks":1663},". Without context, team members are just pushing pixels with no sense of purpose.",[1664],{"type":83,"attrs":1665},{"color":85},{"type":580,"attrs":1667,"content":1668},{"level":633,"textAlign":19},[1669],{"text":1670,"type":80,"marks":1671},"2. Current state analysis",[1672],{"type":83,"attrs":1673},{"color":1445},{"type":75,"attrs":1675,"content":1676},{"textAlign":19},[1677],{"text":1678,"type":80,"marks":1679},"Before you can fix something, you need to understand what's broken. This section is especially important when presenting to stakeholders who may not be aware of the current product's shortcomings.",[1680],{"type":83,"attrs":1681},{"color":85},{"type":75,"attrs":1683,"content":1684},{"textAlign":19},[1685],{"text":1686,"type":80,"marks":1687},"Include:",[1688],{"type":83,"attrs":1689},{"color":85},{"type":642,"content":1691},[1692,1722,1738],{"type":645,"content":1693},[1694],{"type":75,"attrs":1695,"content":1696},{"textAlign":19},[1697,1703,1708,1717],{"text":1698,"type":80,"marks":1699},"UX audit findings",[1700,1702],{"type":83,"attrs":1701},{"color":85},{"type":99},{"text":1704,"type":80,"marks":1705}," -- Summarize insights from heuristic evaluations, usability testing, and user research. ",[1706],{"type":83,"attrs":1707},{"color":85},{"text":1709,"type":80,"marks":1710},"Maze's UX audit framework",[1711,1714,1716],{"type":98,"attrs":1712},{"href":1713,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://maze.co/guides/ux-audit/",{"type":83,"attrs":1715},{"color":1138},{"type":1141},{"text":1718,"type":80,"marks":1719}," is a helpful starting point.",[1720],{"type":83,"attrs":1721},{"color":85},{"type":645,"content":1723},[1724],{"type":75,"attrs":1725,"content":1726},{"textAlign":19},[1727,1733],{"text":1728,"type":80,"marks":1729},"Pain points",[1730,1732],{"type":83,"attrs":1731},{"color":85},{"type":99},{"text":1734,"type":80,"marks":1735}," -- What specific friction points are users experiencing? Connect these to business impact. \"Users abandon the checkout flow at step 3\" is more persuasive than \"the checkout flow could be better.\"",[1736],{"type":83,"attrs":1737},{"color":85},{"type":645,"content":1739},[1740],{"type":75,"attrs":1741,"content":1742},{"textAlign":19},[1743,1749,1754,1762],{"text":1744,"type":80,"marks":1745},"Competitive analysis",[1746,1748],{"type":83,"attrs":1747},{"color":85},{"type":99},{"text":1750,"type":80,"marks":1751}," -- What are competitors doing differently? This is ",[1752],{"type":83,"attrs":1753},{"color":85},{"text":1755,"type":80,"marks":1756},"especially valuable",[1757,1759,1761],{"type":98,"attrs":1758},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1760},{"color":1138},{"type":1141},{"text":1763,"type":80,"marks":1764}," if you're proposing visual design changes or new features.",[1765],{"type":83,"attrs":1766},{"color":85},{"type":75,"attrs":1768,"content":1769},{"textAlign":19},[1770,1774,1782],{"text":1466,"type":80,"marks":1771},[1772],{"type":83,"attrs":1773},{"color":85},{"text":1775,"type":80,"marks":1776},"one designer advises",[1777,1779,1781],{"type":98,"attrs":1778},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1780},{"color":1138},{"type":1141},{"text":1783,"type":80,"marks":1784},", \"Focus on UX discovery as the first order of business. What are the key tasks for your users? What are the pain and pleasure points of the existing application? What are your key differentiators and gaps with your competitors?\"",[1785],{"type":83,"attrs":1786},{"color":85},{"type":580,"attrs":1788,"content":1789},{"level":633,"textAlign":19},[1790],{"text":1791,"type":80,"marks":1792},"3. Objectives and success metrics",[1793],{"type":83,"attrs":1794},{"color":1445},{"type":75,"attrs":1796,"content":1797},{"textAlign":19},[1798],{"text":1799,"type":80,"marks":1800},"This is where you define what success looks like, in measurable terms. Use the SMART framework (Specific, Measurable, Attainable, Relevant, Time-bound) or OKRs (Objectives and Key Results) to structure your goals.",[1801],{"type":83,"attrs":1802},{"color":85},{"type":75,"attrs":1804,"content":1805},{"textAlign":19},[1806],{"text":1807,"type":80,"marks":1808},"Examples:",[1809,1811],{"type":83,"attrs":1810},{"color":85},{"type":99},{"type":642,"content":1813},[1814,1824,1834],{"type":645,"content":1815},[1816],{"type":75,"attrs":1817,"content":1818},{"textAlign":19},[1819],{"text":1820,"type":80,"marks":1821},"Improve checkout conversion rate by 20% within 90 days of launch",[1822],{"type":83,"attrs":1823},{"color":85},{"type":645,"content":1825},[1826],{"type":75,"attrs":1827,"content":1828},{"textAlign":19},[1829],{"text":1830,"type":80,"marks":1831},"Reduce customer support tickets related to navigation by 15% by end of Q3",[1832],{"type":83,"attrs":1833},{"color":85},{"type":645,"content":1835},[1836],{"type":75,"attrs":1837,"content":1838},{"textAlign":19},[1839],{"text":1840,"type":80,"marks":1841},"Achieve a System Usability Scale (SUS) score of 80+ in post-launch usability testing",[1842],{"type":83,"attrs":1843},{"color":85},{"type":75,"attrs":1845,"content":1846},{"textAlign":19},[1847,1852,1861,1866,1874],{"text":1848,"type":80,"marks":1849},"Google's ",[1850],{"type":83,"attrs":1851},{"color":85},{"text":1853,"type":80,"marks":1854},"HEART framework",[1855,1858,1860],{"type":98,"attrs":1856},{"href":1857,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://research.google/pubs/measuring-the-user-experience-on-a-large-scale-user-centered-metrics-for-web-applications/",{"type":83,"attrs":1859},{"color":1138},{"type":1141},{"text":1862,"type":80,"marks":1863}," (Happiness, Engagement, Adoption, Retention, Task success) is another ",[1864],{"type":83,"attrs":1865},{"color":85},{"text":1867,"type":80,"marks":1868},"excellent tool",[1869,1871,1873],{"type":98,"attrs":1870},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1872},{"color":1138},{"type":1141},{"text":1875,"type":80,"marks":1876}," for identifying the right metrics for your redesign.",[1877],{"type":83,"attrs":1878},{"color":85},{"type":580,"attrs":1880,"content":1881},{"level":633,"textAlign":19},[1882],{"text":1883,"type":80,"marks":1884},"4. Product scope: in-scope and out-of-scope",[1885],{"type":83,"attrs":1886},{"color":1445},{"type":75,"attrs":1888,"content":1889},{"textAlign":19},[1890,1895,1901],{"text":1891,"type":80,"marks":1892},"This is the heart of the document. Clearly define what's included in the redesign and, just as importantly, what's ",[1893],{"type":83,"attrs":1894},{"color":85},{"text":1896,"type":80,"marks":1897},"not",[1898,1900],{"type":83,"attrs":1899},{"color":85},{"type":614},{"text":1902,"type":80,"marks":1903}," included.",[1904],{"type":83,"attrs":1905},{"color":85},{"type":75,"attrs":1907,"content":1908},{"textAlign":19},[1909],{"text":1910,"type":80,"marks":1911},"In-scope examples:",[1912,1914],{"type":83,"attrs":1913},{"color":85},{"type":99},{"type":642,"content":1916},[1917,1927,1937],{"type":645,"content":1918},[1919],{"type":75,"attrs":1920,"content":1921},{"textAlign":19},[1922],{"text":1923,"type":80,"marks":1924},"Redesigning the home page and product listing pages",[1925],{"type":83,"attrs":1926},{"color":85},{"type":645,"content":1928},[1929],{"type":75,"attrs":1930,"content":1931},{"textAlign":19},[1932],{"text":1933,"type":80,"marks":1934},"Implementing a new responsive navigation system",[1935],{"type":83,"attrs":1936},{"color":85},{"type":645,"content":1938},[1939],{"type":75,"attrs":1940,"content":1941},{"textAlign":19},[1942],{"text":1943,"type":80,"marks":1944},"Upgrading the checkout form from 4 steps to 2",[1945],{"type":83,"attrs":1946},{"color":85},{"type":75,"attrs":1948,"content":1949},{"textAlign":19},[1950],{"text":1951,"type":80,"marks":1952},"Out-of-scope examples:",[1953,1955],{"type":83,"attrs":1954},{"color":85},{"type":99},{"type":642,"content":1957},[1958,1968,1978],{"type":645,"content":1959},[1960],{"type":75,"attrs":1961,"content":1962},{"textAlign":19},[1963],{"text":1964,"type":80,"marks":1965},"Mobile app redesign (web only for this phase)",[1966],{"type":83,"attrs":1967},{"color":85},{"type":645,"content":1969},[1970],{"type":75,"attrs":1971,"content":1972},{"textAlign":19},[1973],{"text":1974,"type":80,"marks":1975},"Backend CRM system changes",[1976],{"type":83,"attrs":1977},{"color":85},{"type":645,"content":1979},[1980],{"type":75,"attrs":1981,"content":1982},{"textAlign":19},[1983],{"text":1984,"type":80,"marks":1985},"Content migration of blog posts older than 2024",[1986],{"type":83,"attrs":1987},{"color":85},{"type":75,"attrs":1989,"content":1990},{"textAlign":19},[1991],{"text":1992,"type":80,"marks":1993},"The out-of-scope list is arguably more important than the in-scope list. It eliminates assumptions and gives you a clear reference when scope creep starts knocking. As one project management practitioner explains, \"The ins and outs become really helpful because it gives you even greater clarity with what exactly you're going to be doing and not doing, and can eliminate some assumptions.\"",[1994],{"type":83,"attrs":1995},{"color":85},{"type":75,"attrs":1997,"content":1998},{"textAlign":19},[1999,2005,2010,2016,2021,2027],{"text":2000,"type":80,"marks":2001},"Pro tip:",[2002,2004],{"type":83,"attrs":2003},{"color":85},{"type":99},{"text":2006,"type":80,"marks":2007}," It's important to distinguish between ",[2008],{"type":83,"attrs":2009},{"color":85},{"text":2011,"type":80,"marks":2012},"project scope",[2013,2015],{"type":83,"attrs":2014},{"color":85},{"type":614},{"text":2017,"type":80,"marks":2018}," and ",[2019],{"type":83,"attrs":2020},{"color":85},{"text":2022,"type":80,"marks":2023},"product scope",[2024,2026],{"type":83,"attrs":2025},{"color":85},{"type":614},{"text":2028,"type":80,"marks":2029},". Project scope is the work, the meetings, design hours, and review cycles. Product scope is the functionality, the new buttons, new layouts, and new features. Your scope document should address both.",[2030],{"type":83,"attrs":2031},{"color":85},{"type":580,"attrs":2033,"content":2034},{"level":633,"textAlign":19},[2035],{"text":2036,"type":80,"marks":2037},"5. Vision and strategy",[2038],{"type":83,"attrs":2039},{"color":1445},{"type":75,"attrs":2041,"content":2042},{"textAlign":19},[2043],{"text":2044,"type":80,"marks":2045},"Include a clear, concise vision statement that answers: \"Where are we heading and why?\" This should be one or two sentences that the entire team can understand and rally behind.",[2046],{"type":83,"attrs":2047},{"color":85},{"type":75,"attrs":2049,"content":2050},{"textAlign":19},[2051,2057],{"text":2052,"type":80,"marks":2053},"Good vision statement:",[2054,2056],{"type":83,"attrs":2055},{"color":85},{"type":99},{"text":2058,"type":80,"marks":2059}," \"Redesign our checkout experience to be the fastest and most intuitive in the industry, reducing friction and building trust at every step.\"",[2060],{"type":83,"attrs":2061},{"color":85},{"type":75,"attrs":2063,"content":2064},{"textAlign":19},[2065,2071],{"text":2066,"type":80,"marks":2067},"Bad vision statement:",[2068,2070],{"type":83,"attrs":2069},{"color":85},{"type":99},{"text":2072,"type":80,"marks":2073}," \"To be the best eCommerce platform in the world.\" (Too vague, no direction.)",[2074],{"type":83,"attrs":2075},{"color":85},{"type":75,"attrs":2077,"content":2078},{"textAlign":19},[2079,2084,2092],{"text":2080,"type":80,"marks":2081},"The vision statement serves as the ",[2082],{"type":83,"attrs":2083},{"color":85},{"text":2085,"type":80,"marks":2086},"foundation for your strategy goals",[2087,2089,2091],{"type":98,"attrs":2088},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":2090},{"color":1138},{"type":1141},{"text":2093,"type":80,"marks":2094},". When tough trade-off decisions come up during the project, the vision is what helps the team decide which path to take.",[2095],{"type":83,"attrs":2096},{"color":85},{"type":580,"attrs":2098,"content":2099},{"level":633,"textAlign":19},[2100],{"text":2101,"type":80,"marks":2102},"6. Proposed solution",[2103],{"type":83,"attrs":2104},{"color":1445},{"type":75,"attrs":2106,"content":2107},{"textAlign":19},[2108],{"text":2109,"type":80,"marks":2110},"Now show stakeholders a preview of what you're building. Depending on the type of redesign, this might include:",[2111],{"type":83,"attrs":2112},{"color":85},{"type":642,"content":2114},[2115,2131,2147],{"type":645,"content":2116},[2117],{"type":75,"attrs":2118,"content":2119},{"textAlign":19},[2120,2126],{"text":2121,"type":80,"marks":2122},"Information architecture improvements",[2123,2125],{"type":83,"attrs":2124},{"color":85},{"type":99},{"text":2127,"type":80,"marks":2128}," -- Updated sitemaps, navigation structures, and content hierarchies.",[2129],{"type":83,"attrs":2130},{"color":85},{"type":645,"content":2132},[2133],{"type":75,"attrs":2134,"content":2135},{"textAlign":19},[2136,2142],{"text":2137,"type":80,"marks":2138},"Interaction design changes",[2139,2141],{"type":83,"attrs":2140},{"color":85},{"type":99},{"text":2143,"type":80,"marks":2144}," -- New user flows, interaction patterns, and journey maps.",[2145],{"type":83,"attrs":2146},{"color":85},{"type":645,"content":2148},[2149],{"type":75,"attrs":2150,"content":2151},{"textAlign":19},[2152,2158],{"text":2153,"type":80,"marks":2154},"Visual design direction",[2155,2157],{"type":83,"attrs":2156},{"color":85},{"type":99},{"text":2159,"type":80,"marks":2160}," -- Color schemes, typography, imagery, and overall aesthetic.",[2161],{"type":83,"attrs":2162},{"color":85},{"type":75,"attrs":2164,"content":2165},{"textAlign":19},[2166,2171,2179],{"text":2167,"type":80,"marks":2168},"One important note from ",[2169],{"type":83,"attrs":2170},{"color":85},{"text":2172,"type":80,"marks":2173},"UXPlanet",[2174,2176,2178],{"type":98,"attrs":2175},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":2177},{"color":1138},{"type":1141},{"text":2180,"type":80,"marks":2181},": \"When communicating new designs to stakeholders, try to avoid using low-fidelity wireframes because wireframes can easily create an impression of unfinished design. Not all stakeholders understand how grey boxes and arrows will translate into pixel-perfect design.\" Use high-fidelity mockups whenever possible.",[2182],{"type":83,"attrs":2183},{"color":85},{"type":580,"attrs":2185,"content":2186},{"level":633,"textAlign":19},[2187],{"text":2188,"type":80,"marks":2189},"7. Key deliverables",[2190],{"type":83,"attrs":2191},{"color":1445},{"type":75,"attrs":2193,"content":2194},{"textAlign":19},[2195],{"text":2196,"type":80,"marks":2197},"Be explicit about what the project will produce. Typical deliverables include:",[2198],{"type":83,"attrs":2199},{"color":85},{"type":642,"content":2201},[2202,2218,2234,2250],{"type":645,"content":2203},[2204],{"type":75,"attrs":2205,"content":2206},{"textAlign":19},[2207,2213],{"text":2208,"type":80,"marks":2209},"Research and discovery:",[2210,2212],{"type":83,"attrs":2211},{"color":85},{"type":99},{"text":2214,"type":80,"marks":2215}," User journey maps, competitive audit, stakeholder interview report",[2216],{"type":83,"attrs":2217},{"color":85},{"type":645,"content":2219},[2220],{"type":75,"attrs":2221,"content":2222},{"textAlign":19},[2223,2229],{"text":2224,"type":80,"marks":2225},"Design assets:",[2226,2228],{"type":83,"attrs":2227},{"color":85},{"type":99},{"text":2230,"type":80,"marks":2231}," Wireframes, high-fidelity UI mockups, interactive prototypes, updated design system components",[2232],{"type":83,"attrs":2233},{"color":85},{"type":645,"content":2235},[2236],{"type":75,"attrs":2237,"content":2238},{"textAlign":19},[2239,2245],{"text":2240,"type":80,"marks":2241},"Development and technical:",[2242,2244],{"type":83,"attrs":2243},{"color":85},{"type":99},{"text":2246,"type":80,"marks":2247}," Front-end code, API integrations, QA test results",[2248],{"type":83,"attrs":2249},{"color":85},{"type":645,"content":2251},[2252],{"type":75,"attrs":2253,"content":2254},{"textAlign":19},[2255,2261],{"text":2256,"type":80,"marks":2257},"Documentation:",[2258,2260],{"type":83,"attrs":2259},{"color":85},{"type":99},{"text":2262,"type":80,"marks":2263}," Design specifications for engineers, updated style guide",[2264],{"type":83,"attrs":2265},{"color":85},{"type":580,"attrs":2267,"content":2268},{"level":633,"textAlign":19},[2269],{"text":2270,"type":80,"marks":2271},"8. Timeline and milestones",[2272],{"type":83,"attrs":2273},{"color":1445},{"type":75,"attrs":2275,"content":2276},{"textAlign":19},[2277],{"text":2278,"type":80,"marks":2279},"Map out the major phases and dates:",[2280],{"type":83,"attrs":2281},{"color":85},{"type":2283,"content":2284},"table",[2285,2314,2339,2362,2385,2408,2431,2454],{"type":2286,"content":2287},"tableRow",[2288,2302],{"type":2289,"attrs":2290,"content":2292},"tableHeader",{"colspan":2291,"rowspan":2291,"colwidth":19},1,[2293],{"type":75,"attrs":2294,"content":2295},{"textAlign":19},[2296],{"text":2297,"type":80,"marks":2298},"Milestone",[2299,2301],{"type":83,"attrs":2300},{"color":85},{"type":99},{"type":2289,"attrs":2303,"content":2304},{"colspan":2291,"rowspan":2291,"colwidth":19},[2305],{"type":75,"attrs":2306,"content":2307},{"textAlign":19},[2308],{"text":2309,"type":80,"marks":2310},"Target date",[2311,2313],{"type":83,"attrs":2312},{"color":85},{"type":99},{"type":2286,"content":2315},[2316,2328],{"type":2317,"attrs":2318,"content":2319},"tableCell",{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2320],{"type":75,"attrs":2321,"content":2322},{"textAlign":19},[2323],{"text":2324,"type":80,"marks":2325},"Project kickoff",[2326],{"type":83,"attrs":2327},{"color":85},{"type":2317,"attrs":2329,"content":2330},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2331],{"type":75,"attrs":2332,"content":2333},{"textAlign":19},[2334],{"text":2335,"type":80,"marks":2336},"[Date]",[2337],{"type":83,"attrs":2338},{"color":85},{"type":2286,"content":2340},[2341,2352],{"type":2317,"attrs":2342,"content":2343},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2344],{"type":75,"attrs":2345,"content":2346},{"textAlign":19},[2347],{"text":2348,"type":80,"marks":2349},"Discovery phase complete",[2350],{"type":83,"attrs":2351},{"color":85},{"type":2317,"attrs":2353,"content":2354},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2355],{"type":75,"attrs":2356,"content":2357},{"textAlign":19},[2358],{"text":2335,"type":80,"marks":2359},[2360],{"type":83,"attrs":2361},{"color":85},{"type":2286,"content":2363},[2364,2375],{"type":2317,"attrs":2365,"content":2366},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2367],{"type":75,"attrs":2368,"content":2369},{"textAlign":19},[2370],{"text":2371,"type":80,"marks":2372},"Initial design mockups",[2373],{"type":83,"attrs":2374},{"color":85},{"type":2317,"attrs":2376,"content":2377},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2378],{"type":75,"attrs":2379,"content":2380},{"textAlign":19},[2381],{"text":2335,"type":80,"marks":2382},[2383],{"type":83,"attrs":2384},{"color":85},{"type":2286,"content":2386},[2387,2398],{"type":2317,"attrs":2388,"content":2389},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2390],{"type":75,"attrs":2391,"content":2392},{"textAlign":19},[2393],{"text":2394,"type":80,"marks":2395},"Prototype sign-off",[2396],{"type":83,"attrs":2397},{"color":85},{"type":2317,"attrs":2399,"content":2400},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2401],{"type":75,"attrs":2402,"content":2403},{"textAlign":19},[2404],{"text":2335,"type":80,"marks":2405},[2406],{"type":83,"attrs":2407},{"color":85},{"type":2286,"content":2409},[2410,2421],{"type":2317,"attrs":2411,"content":2412},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2413],{"type":75,"attrs":2414,"content":2415},{"textAlign":19},[2416],{"text":2417,"type":80,"marks":2418},"Development start",[2419],{"type":83,"attrs":2420},{"color":85},{"type":2317,"attrs":2422,"content":2423},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2424],{"type":75,"attrs":2425,"content":2426},{"textAlign":19},[2427],{"text":2335,"type":80,"marks":2428},[2429],{"type":83,"attrs":2430},{"color":85},{"type":2286,"content":2432},[2433,2444],{"type":2317,"attrs":2434,"content":2435},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2436],{"type":75,"attrs":2437,"content":2438},{"textAlign":19},[2439],{"text":2440,"type":80,"marks":2441},"User acceptance testing (UAT)",[2442],{"type":83,"attrs":2443},{"color":85},{"type":2317,"attrs":2445,"content":2446},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2447],{"type":75,"attrs":2448,"content":2449},{"textAlign":19},[2450],{"text":2335,"type":80,"marks":2451},[2452],{"type":83,"attrs":2453},{"color":85},{"type":2286,"content":2455},[2456,2467],{"type":2317,"attrs":2457,"content":2458},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2459],{"type":75,"attrs":2460,"content":2461},{"textAlign":19},[2462],{"text":2463,"type":80,"marks":2464},"Final launch",[2465],{"type":83,"attrs":2466},{"color":85},{"type":2317,"attrs":2468,"content":2469},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2470],{"type":75,"attrs":2471,"content":2472},{"textAlign":19},[2473],{"text":2335,"type":80,"marks":2474},[2475],{"type":83,"attrs":2476},{"color":85},{"type":75,"attrs":2478,"content":2479},{"textAlign":19},[2480],{"text":2481,"type":80,"marks":2482},"Keep the timeline high-level at this stage. The detailed project plan comes later. The purpose here is to set expectations and give stakeholders a realistic picture of the timeline, which often differs significantly from what executives initially expect.",[2483],{"type":83,"attrs":2484},{"color":85},{"type":580,"attrs":2486,"content":2487},{"level":633,"textAlign":19},[2488],{"text":2489,"type":80,"marks":2490},"9. Risks, assumptions, and approvals",[2491],{"type":83,"attrs":2492},{"color":1445},{"type":75,"attrs":2494,"content":2495},{"textAlign":19},[2496],{"text":2497,"type":80,"marks":2498},"Round out the document with:",[2499],{"type":83,"attrs":2500},{"color":85},{"type":642,"content":2502},[2503,2519,2535,2551],{"type":645,"content":2504},[2505],{"type":75,"attrs":2506,"content":2507},{"textAlign":19},[2508,2514],{"text":2509,"type":80,"marks":2510},"Assumptions",[2511,2513],{"type":83,"attrs":2512},{"color":85},{"type":99},{"text":2515,"type":80,"marks":2516}," -- Things you're taking for granted that could change. Example: \"The current API will support the new frontend framework.\"",[2517],{"type":83,"attrs":2518},{"color":85},{"type":645,"content":2520},[2521],{"type":75,"attrs":2522,"content":2523},{"textAlign":19},[2524,2530],{"text":2525,"type":80,"marks":2526},"Risks and mitigations",[2527,2529],{"type":83,"attrs":2528},{"color":85},{"type":99},{"text":2531,"type":80,"marks":2532}," -- What could go wrong, and what's your plan? Example: Risk: \"User resistance to the new design.\" Mitigation: \"A/B test with a small user group before full rollout.\"",[2533],{"type":83,"attrs":2534},{"color":85},{"type":645,"content":2536},[2537],{"type":75,"attrs":2538,"content":2539},{"textAlign":19},[2540,2546],{"text":2541,"type":80,"marks":2542},"Constraints",[2543,2545],{"type":83,"attrs":2544},{"color":85},{"type":99},{"text":2547,"type":80,"marks":2548}," -- Hard limits like budget, compliance requirements (GDPR, accessibility standards), or technology restrictions.",[2549],{"type":83,"attrs":2550},{"color":85},{"type":645,"content":2552},[2553],{"type":75,"attrs":2554,"content":2555},{"textAlign":19},[2556,2562],{"text":2557,"type":80,"marks":2558},"Approvals",[2559,2561],{"type":83,"attrs":2560},{"color":85},{"type":99},{"text":2563,"type":80,"marks":2564}," -- List the stakeholders who need to sign off before work begins.",[2565],{"type":83,"attrs":2566},{"color":85},{"type":623,"attrs":2568},{"id":1283,"body":2569},[2570],{"_uid":2571,"margin":1153,"component":1154},"i-0d90444e-ec88-4096-952f-6747d338d33a",{"type":580,"attrs":2573,"content":2574},{"level":582,"textAlign":19},[2575],{"text":2576,"type":80,"marks":2577},"Product redesign scope VS product redesign brief: what's the difference?",[2578],{"type":83,"attrs":2579},{"color":85},{"type":75,"attrs":2581,"content":2582},{"textAlign":19},[2583],{"text":2584,"type":80,"marks":2585},"You'll often see the terms \"redesign scope\" and \"redesign brief\" used interchangeably. While they overlap significantly, there's a subtle distinction worth noting:",[2586],{"type":83,"attrs":2587},{"color":85},{"type":2283,"content":2589},[2590,2621,2657,2693,2729],{"type":2286,"content":2591},[2592,2597,2609],{"type":2289,"attrs":2593,"content":2594},{"colspan":2291,"rowspan":2291,"colwidth":19},[2595],{"type":75,"attrs":2596},{"textAlign":19},{"type":2289,"attrs":2598,"content":2599},{"colspan":2291,"rowspan":2291,"colwidth":19},[2600],{"type":75,"attrs":2601,"content":2602},{"textAlign":19},[2603],{"text":2604,"type":80,"marks":2605},"Product redesign scope",[2606,2608],{"type":83,"attrs":2607},{"color":85},{"type":99},{"type":2289,"attrs":2610,"content":2611},{"colspan":2291,"rowspan":2291,"colwidth":19},[2612],{"type":75,"attrs":2613,"content":2614},{"textAlign":19},[2615],{"text":2616,"type":80,"marks":2617},"Product redesign brief",[2618,2620],{"type":83,"attrs":2619},{"color":85},{"type":99},{"type":2286,"content":2622},[2623,2635,2646],{"type":2317,"attrs":2624,"content":2625},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2626],{"type":75,"attrs":2627,"content":2628},{"textAlign":19},[2629],{"text":2630,"type":80,"marks":2631},"Primary audience",[2632,2634],{"type":83,"attrs":2633},{"color":85},{"type":99},{"type":2317,"attrs":2636,"content":2637},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2638],{"type":75,"attrs":2639,"content":2640},{"textAlign":19},[2641],{"text":2642,"type":80,"marks":2643},"Project team and stakeholders",[2644],{"type":83,"attrs":2645},{"color":85},{"type":2317,"attrs":2647,"content":2648},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2649],{"type":75,"attrs":2650,"content":2651},{"textAlign":19},[2652],{"text":2653,"type":80,"marks":2654},"Design team (sometimes external agencies)",[2655],{"type":83,"attrs":2656},{"color":85},{"type":2286,"content":2658},[2659,2671,2682],{"type":2317,"attrs":2660,"content":2661},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2662],{"type":75,"attrs":2663,"content":2664},{"textAlign":19},[2665],{"text":2666,"type":80,"marks":2667},"Focus",[2668,2670],{"type":83,"attrs":2669},{"color":85},{"type":99},{"type":2317,"attrs":2672,"content":2673},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2674],{"type":75,"attrs":2675,"content":2676},{"textAlign":19},[2677],{"text":2678,"type":80,"marks":2679},"Boundaries, constraints, and success criteria",[2680],{"type":83,"attrs":2681},{"color":85},{"type":2317,"attrs":2683,"content":2684},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2685],{"type":75,"attrs":2686,"content":2687},{"textAlign":19},[2688],{"text":2689,"type":80,"marks":2690},"Creative direction, brand context, and design goals",[2691],{"type":83,"attrs":2692},{"color":85},{"type":2286,"content":2694},[2695,2707,2718],{"type":2317,"attrs":2696,"content":2697},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2698],{"type":75,"attrs":2699,"content":2700},{"textAlign":19},[2701],{"text":2702,"type":80,"marks":2703},"Includes",[2704,2706],{"type":83,"attrs":2705},{"color":85},{"type":99},{"type":2317,"attrs":2708,"content":2709},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2710],{"type":75,"attrs":2711,"content":2712},{"textAlign":19},[2713],{"text":2714,"type":80,"marks":2715},"In/out of scope, timeline, risks, KPIs",[2716],{"type":83,"attrs":2717},{"color":85},{"type":2317,"attrs":2719,"content":2720},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2721],{"type":75,"attrs":2722,"content":2723},{"textAlign":19},[2724],{"text":2725,"type":80,"marks":2726},"Target audience profiles, visual references, tone of voice",[2727],{"type":83,"attrs":2728},{"color":85},{"type":2286,"content":2730},[2731,2743,2754],{"type":2317,"attrs":2732,"content":2733},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2734],{"type":75,"attrs":2735,"content":2736},{"textAlign":19},[2737],{"text":2738,"type":80,"marks":2739},"Purpose",[2740,2742],{"type":83,"attrs":2741},{"color":85},{"type":99},{"type":2317,"attrs":2744,"content":2745},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2746],{"type":75,"attrs":2747,"content":2748},{"textAlign":19},[2749],{"text":2750,"type":80,"marks":2751},"Define what will and won't be done",[2752],{"type":83,"attrs":2753},{"color":85},{"type":2317,"attrs":2755,"content":2756},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2757],{"type":75,"attrs":2758,"content":2759},{"textAlign":19},[2760],{"text":2761,"type":80,"marks":2762},"Inspire and guide the design direction",[2763],{"type":83,"attrs":2764},{"color":85},{"type":75,"attrs":2766,"content":2767},{"textAlign":19},[2768],{"text":2769,"type":80,"marks":2770},"In practice, many teams combine both into a single document. If you're working with an external design agency, you'll likely need a more detailed brief. If the redesign is handled in-house, a comprehensive scope document usually covers everything you need.",[2771],{"type":83,"attrs":2772},{"color":85},{"type":75,"attrs":2774,"content":2775},{"textAlign":19},[2776,2781,2790,2794,2803],{"text":2777,"type":80,"marks":2778},"For more on writing effective design briefs, ",[2779],{"type":83,"attrs":2780},{"color":85},{"text":2782,"type":80,"marks":2783},"Eleken's guide to creating a design brief",[2784,2787,2789],{"type":98,"attrs":2785},{"href":2786,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.eleken.co/blog-posts/design-brief-example-how-it-should-look-like-and-what-it-should-contain",{"type":83,"attrs":2788},{"color":1138},{"type":1141},{"text":2017,"type":80,"marks":2791},[2792],{"type":83,"attrs":2793},{"color":85},{"text":2795,"type":80,"marks":2796},"UXPin's design brief guide",[2797,2800,2802],{"type":98,"attrs":2798},{"href":2799,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.uxpin.com/studio/blog/design-brief/",{"type":83,"attrs":2801},{"color":1138},{"type":1141},{"text":2804,"type":80,"marks":2805}," are both excellent resources.",[2806],{"type":83,"attrs":2807},{"color":85},{"type":623,"attrs":2809},{"id":1283,"body":2810},[2811],{"_uid":2812,"margin":1153,"component":1154},"i-fe4fa7f7-4c01-4898-a1c0-b84216dac8b3",{"type":580,"attrs":2814,"content":2815},{"level":582,"textAlign":19},[2816],{"text":2817,"type":80,"marks":2818},"Free product redesign scope templates you can use today",[2819],{"type":83,"attrs":2820},{"color":85},{"type":75,"attrs":2822,"content":2823},{"textAlign":19},[2824],{"text":2825,"type":80,"marks":2826},"You don't have to start from scratch. Here are some of the best free templates available:",[2827],{"type":83,"attrs":2828},{"color":85},{"type":580,"attrs":2830,"content":2831},{"level":633,"textAlign":19},[2832],{"text":2833,"type":80,"marks":2834},"Figma",[2835],{"type":83,"attrs":2836},{"color":1445},{"type":642,"content":2838},[2839,2858,2877,2896],{"type":645,"content":2840},[2841],{"type":75,"attrs":2842,"content":2843},{"textAlign":19},[2844,2853],{"text":2845,"type":80,"marks":2846},"Project scope template",[2847,2850,2852],{"type":98,"attrs":2848},{"href":2849,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1106702594278618457/project-scope-template",{"type":83,"attrs":2851},{"color":1138},{"type":1141},{"text":2854,"type":80,"marks":2855}," -- A clean, visual template for defining project boundaries directly in Figma.",[2856],{"type":83,"attrs":2857},{"color":85},{"type":645,"content":2859},[2860],{"type":75,"attrs":2861,"content":2862},{"textAlign":19},[2863,2872],{"text":2864,"type":80,"marks":2865},"FigJam project scope example",[2866,2869,2871],{"type":98,"attrs":2867},{"href":2868,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/templates/project-scope-example/",{"type":83,"attrs":2870},{"color":1138},{"type":1141},{"text":2873,"type":80,"marks":2874}," -- A collaborative whiteboard-style template great for team workshops.",[2875],{"type":83,"attrs":2876},{"color":85},{"type":645,"content":2878},[2879],{"type":75,"attrs":2880,"content":2881},{"textAlign":19},[2882,2891],{"text":2883,"type":80,"marks":2884},"UX project scoping template",[2885,2888,2890],{"type":98,"attrs":2886},{"href":2887,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1324496750757762106/ux-project-scoping-template",{"type":83,"attrs":2889},{"color":1138},{"type":1141},{"text":2892,"type":80,"marks":2893}," -- Specifically designed for UX projects with sections for research, design, and testing.",[2894],{"type":83,"attrs":2895},{"color":85},{"type":645,"content":2897},[2898],{"type":75,"attrs":2899,"content":2900},{"textAlign":19},[2901,2910],{"text":2902,"type":80,"marks":2903},"UX project scope canvas",[2904,2907,2909],{"type":98,"attrs":2905},{"href":2906,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1227756915677842825/ux-project-scope-canvas-ux-playbook",{"type":83,"attrs":2908},{"color":1138},{"type":1141},{"text":2911,"type":80,"marks":2912}," -- A canvas-style template from the UX Playbook.",[2913],{"type":83,"attrs":2914},{"color":85},{"type":580,"attrs":2916,"content":2917},{"level":633,"textAlign":19},[2918],{"text":2919,"type":80,"marks":2920},"Miro",[2921],{"type":83,"attrs":2922},{"color":1445},{"type":642,"content":2924},[2925],{"type":645,"content":2926},[2927],{"type":75,"attrs":2928,"content":2929},{"textAlign":19},[2930,2938],{"text":2845,"type":80,"marks":2931},[2932,2935,2937],{"type":98,"attrs":2933},{"href":2934,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://miro.com/templates/project-scope/",{"type":83,"attrs":2936},{"color":1138},{"type":1141},{"text":2939,"type":80,"marks":2940}," -- A collaborative board template ideal for remote teams who want to build their scope document together in real time.",[2941],{"type":83,"attrs":2942},{"color":85},{"type":580,"attrs":2944,"content":2945},{"level":633,"textAlign":19},[2946],{"text":2947,"type":80,"marks":2948},"Notion",[2949],{"type":83,"attrs":2950},{"color":1445},{"type":642,"content":2952},[2953,2972],{"type":645,"content":2954},[2955],{"type":75,"attrs":2956,"content":2957},{"textAlign":19},[2958,2967],{"text":2959,"type":80,"marks":2960},"Design brief templates collection",[2961,2964,2966],{"type":98,"attrs":2962},{"href":2963,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.notion.com/templates/collections/top-10-design-brief-templates-for-product-development-managers",{"type":83,"attrs":2965},{"color":1138},{"type":1141},{"text":2968,"type":80,"marks":2969}," -- A curated collection of design brief templates for product development managers.",[2970],{"type":83,"attrs":2971},{"color":85},{"type":645,"content":2973},[2974],{"type":75,"attrs":2975,"content":2976},{"textAlign":19},[2977,2986],{"text":2978,"type":80,"marks":2979},"Project proposal template for designers",[2980,2983,2985],{"type":98,"attrs":2981},{"href":2982,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.notion.com/templates/projectproposal",{"type":83,"attrs":2984},{"color":1138},{"type":1141},{"text":2987,"type":80,"marks":2988}," -- A structured proposal template with sections that map well to redesign scoping.",[2989],{"type":83,"attrs":2990},{"color":85},{"type":580,"attrs":2992,"content":2993},{"level":633,"textAlign":19},[2994],{"text":2995,"type":80,"marks":2996},"Other tools",[2997],{"type":83,"attrs":2998},{"color":1445},{"type":642,"content":3000},[3001,3020,3039,3058],{"type":645,"content":3002},[3003],{"type":75,"attrs":3004,"content":3005},{"textAlign":19},[3006,3015],{"text":3007,"type":80,"marks":3008},"Project scope template for Word",[3009,3012,3014],{"type":98,"attrs":3010},{"href":3011,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.projectmanager.com/templates/project-scope-template",{"type":83,"attrs":3013},{"color":1138},{"type":1141},{"text":3016,"type":80,"marks":3017}," -- A traditional document-style template from ProjectManager, great for teams that prefer Word or Google Docs.",[3018],{"type":83,"attrs":3019},{"color":85},{"type":645,"content":3021},[3022],{"type":75,"attrs":3023,"content":3024},{"textAlign":19},[3025,3034],{"text":3026,"type":80,"marks":3027},"Project scope templates for Excel and Word",[3028,3031,3033],{"type":98,"attrs":3029},{"href":3030,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.smartsheet.com/content/project-scope-templates",{"type":83,"attrs":3032},{"color":1138},{"type":1141},{"text":3035,"type":80,"marks":3036}," -- Multiple formats from Smartsheet with varying levels of detail.",[3037],{"type":83,"attrs":3038},{"color":85},{"type":645,"content":3040},[3041],{"type":75,"attrs":3042,"content":3043},{"textAlign":19},[3044,3053],{"text":3045,"type":80,"marks":3046},"Website redesign scope of work template",[3047,3050,3052],{"type":98,"attrs":3048},{"href":3049,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.wethos.co/scope-of-work-templates/website-redesign",{"type":83,"attrs":3051},{"color":1138},{"type":1141},{"text":3054,"type":80,"marks":3055}," -- Specifically tailored to website redesign projects, from Wethos.",[3056],{"type":83,"attrs":3057},{"color":85},{"type":645,"content":3059},[3060],{"type":75,"attrs":3061,"content":3062},{"textAlign":19},[3063,3072],{"text":3064,"type":80,"marks":3065},"Product brief template",[3066,3069,3071],{"type":98,"attrs":3067},{"href":3068,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://asana.com/resources/product-brief-template",{"type":83,"attrs":3070},{"color":1138},{"type":1141},{"text":3073,"type":80,"marks":3074}," -- From Asana, focused on the product brief angle with built-in project management integration.",[3075],{"type":83,"attrs":3076},{"color":85},{"type":623,"attrs":3078},{"id":1283,"body":3079},[3080],{"_uid":3081,"margin":1153,"component":1154},"i-ed56f1a2-ed4f-4a7f-bbba-cb7cebb1c11e",{"type":580,"attrs":3083,"content":3084},{"level":582,"textAlign":19},[3085],{"text":3086,"type":80,"marks":3087},"Tips for writing a product redesign scope that actually works",[3088],{"type":83,"attrs":3089},{"color":85},{"type":580,"attrs":3091,"content":3092},{"level":633,"textAlign":19},[3093],{"text":3094,"type":80,"marks":3095},"Start with discovery, not solutions",[3096],{"type":83,"attrs":3097},{"color":1445},{"type":75,"attrs":3099,"content":3100},{"textAlign":19},[3101,3106,3114],{"text":3102,"type":80,"marks":3103},"It's tempting to jump straight into defining your redesigned UI. Resist that urge. As one ",[3104],{"type":83,"attrs":3105},{"color":85},{"text":3107,"type":80,"marks":3108},"experienced designer on Reddit",[3109,3111,3113],{"type":98,"attrs":3110},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3112},{"color":1138},{"type":1141},{"text":3115,"type":80,"marks":3116}," advises, \"Focus on UX discovery as the first order of business... Only once these questions are answered can you really start to develop any grounded visual, interaction, or information design concepts.\"",[3117],{"type":83,"attrs":3118},{"color":85},{"type":580,"attrs":3120,"content":3121},{"level":633,"textAlign":19},[3122],{"text":3123,"type":80,"marks":3124},"Don't build the design system first",[3125],{"type":83,"attrs":3126},{"color":1445},{"type":75,"attrs":3128,"content":3129},{"textAlign":19},[3130,3135,3143],{"text":3131,"type":80,"marks":3132},"When tackling a full redesign, teams often want to start by creating a comprehensive design system. This can be a trap. As ",[3133],{"type":83,"attrs":3134},{"color":85},{"text":3136,"type":80,"marks":3137},"another practitioner warns",[3138,3140,3142],{"type":98,"attrs":3139},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3141},{"color":1138},{"type":1141},{"text":3144,"type":80,"marks":3145},", \"One of the biggest mistakes people make is starting with a design system and then 3 months later there's a detailed system but no product. Build out a system as you work on core flows.\"",[3146],{"type":83,"attrs":3147},{"color":85},{"type":580,"attrs":3149,"content":3150},{"level":633,"textAlign":19},[3151],{"text":3152,"type":80,"marks":3153},"Prioritize key flows over comprehensive coverage",[3154],{"type":83,"attrs":3155},{"color":1445},{"type":75,"attrs":3157,"content":3158},{"textAlign":19},[3159,3164,3172],{"text":3160,"type":80,"marks":3161},"You can't redesign everything at once. Start with the flows that have the biggest impact on users and the business. A ",[3162],{"type":83,"attrs":3163},{"color":85},{"text":3165,"type":80,"marks":3166},"common approach",[3167,3169,3171],{"type":98,"attrs":3168},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3170},{"color":1138},{"type":1141},{"text":3173,"type":80,"marks":3174}," is to \"target key pain points and important flows first to establish the baseline of your system, and then apply it more broadly.\"",[3175],{"type":83,"attrs":3176},{"color":85},{"type":580,"attrs":3178,"content":3179},{"level":633,"textAlign":19},[3180],{"text":3181,"type":80,"marks":3182},"Include a usability testing plan",[3183],{"type":83,"attrs":3184},{"color":1445},{"type":75,"attrs":3186,"content":3187},{"textAlign":19},[3188,3193,3201],{"text":3189,"type":80,"marks":3190},"Stakeholders will inevitably ask, \"How do you know this new design will work better?\" Pre-empt this by including a testing plan in your scope. As ",[3191],{"type":83,"attrs":3192},{"color":85},{"text":3194,"type":80,"marks":3195},"UXPlanet advises",[3196,3198,3200],{"type":98,"attrs":3197},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3199},{"color":1138},{"type":1141},{"text":3202,"type":80,"marks":3203},", outline the usability testing methods you'll use, the metrics you'll measure, and how you'll incorporate feedback into iterative improvements.",[3204],{"type":83,"attrs":3205},{"color":85},{"type":580,"attrs":3207,"content":3208},{"level":633,"textAlign":19},[3209],{"text":3210,"type":80,"marks":3211},"Invest in stakeholder management",[3212],{"type":83,"attrs":3213},{"color":1445},{"type":75,"attrs":3215,"content":3216},{"textAlign":19},[3217],{"text":3218,"type":80,"marks":3219},"Don't underestimate the political dimension of redesign projects. Get buy-in early and often. Your scope document is one of the most powerful tools for this -- it shows stakeholders that you've thought through the problem, have a clear plan, and understand the constraints.",[3220],{"type":83,"attrs":3221},{"color":85},{"type":580,"attrs":3223,"content":3224},{"level":633,"textAlign":19},[3225],{"text":3226,"type":80,"marks":3227},"Write for your audience",[3228],{"type":83,"attrs":3229},{"color":1445},{"type":75,"attrs":3231,"content":3232},{"textAlign":19},[3233],{"text":3234,"type":80,"marks":3235},"If your scope document is going to executives, lead with business impact and keep design jargon to a minimum. If it's for your design and engineering team, get technical. The best scope documents are the ones people actually read.",[3236],{"type":83,"attrs":3237},{"color":85},{"type":623,"attrs":3239},{"id":1283,"body":3240},[3241],{"_uid":3242,"margin":1153,"component":1154},"i-56016b26-b093-460c-a97a-2edf2bdc778b",{"type":580,"attrs":3244,"content":3245},{"level":582,"textAlign":19},[3246],{"text":3247,"type":80,"marks":3248},"Key takeaways",[3249],{"type":83,"attrs":3250},{"color":85},{"type":642,"content":3252},[3253,3274,3295,3316,3337,3353,3374,3394,3441,3462],{"type":645,"content":3254},[3255],{"type":75,"attrs":3256,"content":3257},{"textAlign":19},[3258,3263,3269],{"text":3259,"type":80,"marks":3260},"A ",[3261],{"type":83,"attrs":3262},{"color":85},{"text":3264,"type":80,"marks":3265},"product redesign scope template",[3266,3268],{"type":83,"attrs":3267},{"color":85},{"type":99},{"text":3270,"type":80,"marks":3271}," defines the boundaries, goals, deliverables, and success metrics for a redesign project. It's the single most important document for keeping a redesign on track.",[3272],{"type":83,"attrs":3273},{"color":85},{"type":645,"content":3275},[3276],{"type":75,"attrs":3277,"content":3278},{"textAlign":19},[3279,3284,3290],{"text":3280,"type":80,"marks":3281},"Always include ",[3282],{"type":83,"attrs":3283},{"color":85},{"text":3285,"type":80,"marks":3286},"what's in scope and out of scope",[3287,3289],{"type":83,"attrs":3288},{"color":85},{"type":99},{"text":3291,"type":80,"marks":3292},". The out-of-scope list is your best defense against scope creep.",[3293],{"type":83,"attrs":3294},{"color":85},{"type":645,"content":3296},[3297],{"type":75,"attrs":3298,"content":3299},{"textAlign":19},[3300,3305,3311],{"text":3301,"type":80,"marks":3302},"Define ",[3303],{"type":83,"attrs":3304},{"color":85},{"text":3306,"type":80,"marks":3307},"measurable objectives",[3308,3310],{"type":83,"attrs":3309},{"color":85},{"type":99},{"text":3312,"type":80,"marks":3313}," using frameworks like SMART goals, OKRs, or Google's HEART framework. \"Make it better\" is not a goal.",[3314],{"type":83,"attrs":3315},{"color":85},{"type":645,"content":3317},[3318],{"type":75,"attrs":3319,"content":3320},{"textAlign":19},[3321,3326,3332],{"text":3322,"type":80,"marks":3323},"Include a ",[3324],{"type":83,"attrs":3325},{"color":85},{"text":3327,"type":80,"marks":3328},"current state analysis",[3329,3331],{"type":83,"attrs":3330},{"color":85},{"type":99},{"text":3333,"type":80,"marks":3334}," with UX audit findings, pain points, and competitive analysis to justify the redesign to stakeholders.",[3335],{"type":83,"attrs":3336},{"color":85},{"type":645,"content":3338},[3339],{"type":75,"attrs":3340,"content":3341},{"textAlign":19},[3342,3348],{"text":3343,"type":80,"marks":3344},"Start with discovery",[3345,3347],{"type":83,"attrs":3346},{"color":85},{"type":99},{"text":3349,"type":80,"marks":3350}," before defining solutions. Understand user needs and pain points before designing new interfaces.",[3351],{"type":83,"attrs":3352},{"color":85},{"type":645,"content":3354},[3355],{"type":75,"attrs":3356,"content":3357},{"textAlign":19},[3358,3363,3369],{"text":3359,"type":80,"marks":3360},"Use ",[3361],{"type":83,"attrs":3362},{"color":85},{"text":3364,"type":80,"marks":3365},"high-fidelity mockups",[3366,3368],{"type":83,"attrs":3367},{"color":85},{"type":99},{"text":3370,"type":80,"marks":3371}," rather than wireframes when presenting proposed solutions to stakeholders.",[3372],{"type":83,"attrs":3373},{"color":85},{"type":645,"content":3375},[3376],{"type":75,"attrs":3377,"content":3378},{"textAlign":19},[3379,3383,3389],{"text":3322,"type":80,"marks":3380},[3381],{"type":83,"attrs":3382},{"color":85},{"text":3384,"type":80,"marks":3385},"usability testing plan",[3386,3388],{"type":83,"attrs":3387},{"color":85},{"type":99},{"text":3390,"type":80,"marks":3391}," to demonstrate that your new design will be validated before launch.",[3392],{"type":83,"attrs":3393},{"color":85},{"type":645,"content":3395},[3396],{"type":75,"attrs":3397,"content":3398},{"textAlign":19},[3399,3404,3412,3417,3424,3429,3436],{"text":3400,"type":80,"marks":3401},"Don't start from scratch, use a ",[3402],{"type":83,"attrs":3403},{"color":85},{"text":3405,"type":80,"marks":3406},"free template from Figma",[3407,3409,3411],{"type":98,"attrs":3408},{"href":2868,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3410},{"color":1138},{"type":1141},{"text":3413,"type":80,"marks":3414},", ",[3415],{"type":83,"attrs":3416},{"color":85},{"text":2919,"type":80,"marks":3418},[3419,3421,3423],{"type":98,"attrs":3420},{"href":2934,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3422},{"color":1138},{"type":1141},{"text":3425,"type":80,"marks":3426},", or ",[3427],{"type":83,"attrs":3428},{"color":85},{"text":2947,"type":80,"marks":3430},[3431,3433,3435],{"type":98,"attrs":3432},{"href":2963,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3434},{"color":1138},{"type":1141},{"text":3437,"type":80,"marks":3438}," and customize it to fit your project.",[3439],{"type":83,"attrs":3440},{"color":85},{"type":645,"content":3442},[3443],{"type":75,"attrs":3444,"content":3445},{"textAlign":19},[3446,3451,3457],{"text":3447,"type":80,"marks":3448},"Invest in ",[3449],{"type":83,"attrs":3450},{"color":85},{"text":3452,"type":80,"marks":3453},"stakeholder management",[3454,3456],{"type":83,"attrs":3455},{"color":85},{"type":99},{"text":3458,"type":80,"marks":3459}," from day one. Redesign projects can be politically complex, and a solid scope document builds trust and alignment.",[3460],{"type":83,"attrs":3461},{"color":85},{"type":645,"content":3463},[3464],{"type":75,"attrs":3465,"content":3466},{"textAlign":19},[3467],{"text":3468,"type":80,"marks":3469},"The difference between a successful redesign and a chaotic one often comes down to how well the project was scoped before a single pixel was pushed.",[3470],{"type":83,"attrs":3471},{"color":85},[386,1158,392,3473,3474],"276e7fcf-9b3c-402b-a895-61a2953d21ef","568e096f-e9b3-4e09-8c25-6c0ea6a7248c",{"type":72,"content":3476},[3477],{"type":75},[3479],{"_uid":3480,"component":521,"imageLink":3481,"imageAltText":1214,"mobileImageLink":3482,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"a6998a76-18dc-40c3-b7d4-0bf198fcbd11",{"id":92,"url":1213,"linktype":507,"fieldtype":95,"cached_url":1213},{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"product-redesign-scope-document-templates-and-examples","blog/product-redesign-scope-document-templates-and-examples",-7320,[],"fce902e0-78b4-431a-b27e-b69c76ada860",[],{"name":3491,"created_at":3492,"published_at":3493,"updated_at":3494,"id":3495,"uuid":3496,"content":3497,"slug":5282,"full_slug":5283,"sort_by_date":19,"position":5284,"tag_list":5285,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":5286,"first_published_at":5287,"release_id":19,"lang":26,"path":19,"alternates":5288,"default_full_slug":19,"translated_slugs":19},"Technical Debt in HealthTech: How to Identify, Prioritize, and Resolve It for Accelerated Growth","2026-04-09T13:19:01.184Z","2026-04-10T10:55:50.115Z","2026-04-10T10:55:50.157Z",164049474330798,"467705ed-351c-4092-8a5d-cc7e2074bcc7",{"seo":3498,"_uid":3504,"title":3491,"Subtitle":3505,"authorId":3506,"postBody":3507,"component":1156,"categoryIds":5265,"postSummary":5268,"featuredImage":5275,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":5281},[3499],{"_uid":3500,"image":3501,"title":3502,"noIndex":22,"component":569,"description":3503,"canonicalUrl":92},"c1d4201b-c61f-4b4b-9dc6-78475bbdf901",[],"Technical Debt in HealthTech: How to Identify, Prioritize, and Resolve It for Accelerated Growth | Monterail blog","Manage technical debt in HealthTech before it becomes a legal or financial liability. Learn to identify, prioritize, and resolve debt for scalable, compliant growth.","3c92fb84-dfa0-4a0e-99e4-297d39882966",[],"fa0cb701-255f-4077-a658-bc83fa894e25",[3508,5239],{"_uid":3509,"content":3510,"component":1155},"6bd3a560-82b7-4f36-8bfd-b9cc05e442da",{"type":72,"content":3511},[3512,3520,3542,3544,3582,3590,3598,3613,3615,3624,3641,3673,3681,3690,3732,3768,3776,3785,3833,3841,3863,3872,3898,3926,3966,3974,3983,3991,3999,4007,4016,4024,4046,4054,4056,4061,4070,4089,4101,4259,4261,4266,4274,4306,4308,4316,4324,4332,4341,4349,4357,4365,4374,4382,4390,4398,4407,4415,4447,4455,4464,4472,4504,4535,4537,4542,4550,4558,4579,4587,4595,4603,4611,4619,4627,4635,4643,4651,4673,4681,4690,4698,4706,4711,4713,4721,4729,4737,4745,4753,4761,4769,4777,4809,4817,4825,4976,4978,4983,4991,4999,5007,5015,5017,5022,5030,5038,5046,5054,5062,5070,5078,5086,5094,5102,5124,5126,5186,5194,5202,5210,5218,5226,5234],{"type":75,"attrs":3513,"content":3514},{"textAlign":19},[3515],{"text":3516,"type":80,"marks":3517},"\"Move fast and break things\" wasn't just a Facebook slogan. It was the operating model of an entire generation of tech companies. And for a while, it worked. Breaking things meant breaking markets, breaking incumbents, breaking records. The collateral damage (messy codebases, brittle architectures, security gaps) felt like a fair trade for speed.",[3518],{"type":83,"attrs":3519},{"color":85},{"type":75,"attrs":3521,"content":3522},{"textAlign":19},[3523,3528,3537],{"text":3524,"type":80,"marks":3525},"But in health tech, there was never a grace period to begin with. The shortcuts that buy a SaaS startup six months of runway can buy a health tech startup an OCR audit, a failed Series A, or something far worse. The ",[3526],{"type":83,"attrs":3527},{"color":85},{"text":3529,"type":80,"marks":3530},"real costs of building healthcare software",[3531,3534,3536],{"type":98,"attrs":3532},{"href":3533,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/healthcare-app-development-cost",{"type":83,"attrs":3535},{"color":1138},{"type":1141},{"text":3538,"type":80,"marks":3539}," reflect this complexity from day one.",[3540],{"type":83,"attrs":3541},{"color":85},{"type":75,"attrs":3543},{"textAlign":19},{"type":623,"attrs":3545},{"id":3546,"body":3547},"97534003-f450-44f2-9b7d-6e362e7866db",[3548],{"_uid":3549,"quote":3550,"fontSize":3580,"component":710,"accentColor":3581},"i-5bf236cb-4531-4680-bc4d-fd1544e2fa5a",{"type":72,"content":3551},[3552],{"type":75,"attrs":3553,"content":3554},{"textAlign":19},[3555,3560,3567,3575],{"text":3556,"type":80,"marks":3557},"The UK's",[3558],{"type":83,"attrs":3559},{"color":85},{"text":1124,"type":80,"marks":3561},[3562,3565],{"type":98,"attrs":3563},{"href":3564,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.pslhub.org/blogs/entry/6517-it-failures-causing-patient-deaths-says-nhs-safety-body/",{"type":83,"attrs":3566},{"color":85},{"text":3568,"type":80,"marks":3569},"Health Services Safety Investigations Body (HSSIB)",[3570,3572,3574],{"type":98,"attrs":3571},{"href":3564,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3573},{"color":1138},{"type":1141},{"text":3576,"type":80,"marks":3577}," stated in 2023 that IT failures are actively causing patient deaths",[3578],{"type":83,"attrs":3579},{"color":85},"text-18 md:text-20","green",{"type":75,"attrs":3583,"content":3584},{"textAlign":19},[3585],{"text":3586,"type":80,"marks":3587},"And yet the same founder instincts survive the move into healthcare. \"We'll fix it after launch.\" \"It's just an MVP.\" \"We can refactor once we get funding.\" Most founders mean it, and almost none follow through. By the time the funding lands, there's a product to ship, a customer to onboard, and a roadmap that somehow got longer overnight. The debt stays. It just quietly starts charging interest.",[3588],{"type":83,"attrs":3589},{"color":85},{"type":75,"attrs":3591,"content":3592},{"textAlign":19},[3593],{"text":3594,"type":80,"marks":3595},"This isn't a post about code quality. It's about what happens when the shortcuts you took at month three show up uninvited at your Series A, or in a compliance audit.",[3596],{"type":83,"attrs":3597},{"color":85},{"type":865,"content":3599},[3600],{"type":75,"attrs":3601,"content":3602},{"textAlign":19},[3603,3608,3610,3611],{"text":1231,"type":80,"marks":3604},[3605,3607],{"type":83,"attrs":3606},{"color":85},{"type":99},{"type":3609},"hard_break",{"type":3609},{"text":3612,"type":80},"Health tech founders should treat technical debt as a compliance and business risk, not just a code quality problem. The safest path is incremental modernization using the Strangler Fig pattern, replacing the highest-risk modules (audit trails, PHI handling, EHR integrations) first, while keeping the system live and using a Now/Next/Later prioritization framework tied to fundraising and compliance milestones.\"",{"type":75,"attrs":3614},{"textAlign":19},{"type":580,"attrs":3616,"content":3617},{"level":582,"textAlign":19},[3618],{"text":3619,"type":80,"marks":3620},"What Is Technical Debt, and What Does It Look Like in Health Tech?",[3621,3623],{"type":83,"attrs":3622},{"color":85},{"type":99},{"type":75,"attrs":3625,"content":3626},{"textAlign":19},[3627,3636],{"text":3628,"type":80,"marks":3629},"Technical debt",[3630,3633,3635],{"type":98,"attrs":3631},{"href":3632,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/legacy-systems-and-technical-debt-guide-to-modernization",{"type":83,"attrs":3634},{"color":1138},{"type":1141},{"text":3637,"type":80,"marks":3638}," is any shortcut taken during development that makes future changes more expensive or harder to make, in a health tech product, that might look like:",[3639],{"type":83,"attrs":3640},{"color":85},{"type":642,"content":3642},[3643,3653,3663],{"type":645,"content":3644},[3645],{"type":75,"attrs":3646,"content":3647},{"textAlign":19},[3648],{"text":3649,"type":80,"marks":3650},"Patient data written directly to a database with no audit trail. Fast to build, a HIPAA violation waiting to happen.",[3651],{"type":83,"attrs":3652},{"color":85},{"type":645,"content":3654},[3655],{"type":75,"attrs":3656,"content":3657},{"textAlign":19},[3658],{"text":3659,"type":80,"marks":3660},"A point-to-point HL7 integration with one hospital's EHR. Fine for your first customer, a scalability nightmare by your fifth.",[3661],{"type":83,"attrs":3662},{"color":85},{"type":645,"content":3664},[3665],{"type":75,"attrs":3666,"content":3667},{"textAlign":19},[3668],{"text":3669,"type":80,"marks":3670},"Authentication logic copied across services instead of centralized, until a penetration test finds three different entry points.",[3671],{"type":83,"attrs":3672},{"color":85},{"type":75,"attrs":3674,"content":3675},{"textAlign":19},[3676],{"text":3677,"type":80,"marks":3678},"And these aren't hypothetical issues. They're the patterns that show up in technical due diligence, in breach investigations, and in FDA audits.",[3679],{"type":83,"attrs":3680},{"color":85},{"type":580,"attrs":3682,"content":3683},{"level":633,"textAlign":19},[3684],{"text":3685,"type":80,"marks":3686},"How Does Regulatory Pressure Turn Tech Debt into Legal Debt?",[3687,3689],{"type":83,"attrs":3688},{"color":85},{"type":99},{"type":75,"attrs":3691,"content":3692},{"textAlign":19},[3693,3698,3705,3713,3718,3727],{"text":3694,"type":80,"marks":3695},"In most industries, technical debt slows your team down. In health tech, it also creates active legal exposure because every deferred compliance requirement is a liability that accumulates in the background. HIPAA doesn't grade on a curve. Missing audit logs, unencrypted patient data, weak access controls: understanding",[3696],{"type":83,"attrs":3697},{"color":85},{"text":1124,"type":80,"marks":3699},[3700,3703],{"type":98,"attrs":3701},{"href":3702,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/data-privacy-in-healthcare",{"type":83,"attrs":3704},{"color":85},{"text":3706,"type":80,"marks":3707},"healthcare data privacy requirements",[3708,3710,3712],{"type":98,"attrs":3709},{"href":3702,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3711},{"color":1138},{"type":1141},{"text":3714,"type":80,"marks":3715}," is table stakes, and each gap is a potential violation, with ",[3716],{"type":83,"attrs":3717},{"color":85},{"text":3719,"type":80,"marks":3720},"penalties",[3721,3724,3726],{"type":98,"attrs":3722},{"href":3723,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.hipaaguide.net/2024-penalties-for-hipaa-violations/",{"type":83,"attrs":3725},{"color":1138},{"type":1141},{"text":3728,"type":80,"marks":3729}," ranging from $141 to $2.1 million per violation category per year.",[3730],{"type":83,"attrs":3731},{"color":85},{"type":75,"attrs":3733,"content":3734},{"textAlign":19},[3735,3740,3749,3754,3763],{"text":3736,"type":80,"marks":3737},"For European founders, the pressure is even stronger. The ",[3738],{"type":83,"attrs":3739},{"color":85},{"text":3741,"type":80,"marks":3742},"European Health Data Space",[3743,3746,3748],{"type":98,"attrs":3744},{"href":3745,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://health.ec.europa.eu/ehealth-digital-health-and-care/european-health-data-space-regulation-ehds_en",{"type":83,"attrs":3747},{"color":1138},{"type":1141},{"text":3750,"type":80,"marks":3751}," (EHDS) regulation ",[3752],{"type":83,"attrs":3753},{"color":85},{"text":3755,"type":80,"marks":3756},"entered into force",[3757,3760,3762],{"type":98,"attrs":3758},{"href":3759,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.kennedyslaw.com/en/thought-leadership/article/2026/the-european-health-data-space-is-in-force-implications-for-healthcare-medtech-and-life-sciences/",{"type":83,"attrs":3761},{"color":1138},{"type":1141},{"text":3764,"type":80,"marks":3765}," in March 2025, establishing mandatory interoperability and security standards for EHR vendors and digital health companies, with full enforcement rolling out from 2027 through 2029. It doesn't replace GDPR; it stacks on top of it, alongside the AI Act, MDR, and NIS2.",[3766],{"type":83,"attrs":3767},{"color":85},{"type":75,"attrs":3769,"content":3770},{"textAlign":19},[3771],{"text":3772,"type":80,"marks":3773},"The pattern is consistent: the longer compliance is deferred, the more it costs.",[3774],{"type":83,"attrs":3775},{"color":85},{"type":580,"attrs":3777,"content":3778},{"level":633,"textAlign":19},[3779],{"text":3780,"type":80,"marks":3781},"Why Does Integration Complexity in Health Tech Have No Equivalent Elsewhere?",[3782,3784],{"type":83,"attrs":3783},{"color":85},{"type":99},{"type":75,"attrs":3786,"content":3787},{"textAlign":19},[3788,3793,3800,3808,3813,3820,3828],{"text":3789,"type":80,"marks":3790},"A typical hospital operates across",[3791],{"type":83,"attrs":3792},{"color":85},{"text":1124,"type":80,"marks":3794},[3795,3798],{"type":98,"attrs":3796},{"href":3797,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://kodjin.com/blog/fhir-vs-hl7-key-differences-and-which-is-a-better-choice/",{"type":83,"attrs":3799},{"color":85},{"text":3801,"type":80,"marks":3802},"15–20 separate software platforms",[3803,3805,3807],{"type":98,"attrs":3804},{"href":3797,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3806},{"color":1138},{"type":1141},{"text":3809,"type":80,"marks":3810},": EHRs, lab systems, pharmacy platforms, payer networks, and patient engagement tools. Each speaks a slightly different dialect of",[3811],{"type":83,"attrs":3812},{"color":85},{"text":1124,"type":80,"marks":3814},[3815,3818],{"type":98,"attrs":3816},{"href":3817,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://rhapsody.health/blog/fhir-vs-hl7-explained/",{"type":83,"attrs":3819},{"color":85},{"text":3821,"type":80,"marks":3822},"HL7 or FHIR",[3823,3825,3827],{"type":98,"attrs":3824},{"href":3817,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3826},{"color":1138},{"type":1141},{"text":3829,"type":80,"marks":3830},", the standards that govern how healthcare data is structured and exchanged. No two hospital implementations are identical, even when they run the same EHR vendor.",[3831],{"type":83,"attrs":3832},{"color":85},{"type":75,"attrs":3834,"content":3835},{"textAlign":19},[3836],{"text":3837,"type":80,"marks":3838},"Startups that wire their product directly to each customer's EHR, one point-to-point interface per hospital, don't just accumulate technical debt. They build a business model that gets more expensive with every new customer, as each new hospital requires a new custom integration. And here's what makes it a commercial problem, not just a technical one: that integration burden is shared.",[3839],{"type":83,"attrs":3840},{"color":85},{"type":75,"attrs":3842,"content":3843},{"textAlign":19},[3844,3849,3858],{"text":3845,"type":80,"marks":3846},"Hospitals running non-interoperable ",[3847],{"type":83,"attrs":3848},{"color":85},{"text":3850,"type":80,"marks":3851},"legacy systems",[3852,3855,3857],{"type":98,"attrs":3853},{"href":3854,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://techbullion.com/legacy-software-modernization-for-healthcare-compliance-security-and-roi/",{"type":83,"attrs":3856},{"color":1138},{"type":1141},{"text":3859,"type":80,"marks":3860}," spend $1.5–2.3 million annually on custom data integration work. When your architecture requires bespoke wiring on their end too, you become part of that cost.",[3861],{"type":83,"attrs":3862},{"color":85},{"type":580,"attrs":3864,"content":3865},{"level":633,"textAlign":19},[3866],{"text":3867,"type":80,"marks":3868},"What Are the Data Sensitivity, Security, and Patient Safety Risks?",[3869,3871],{"type":83,"attrs":3870},{"color":85},{"type":99},{"type":75,"attrs":3873,"content":3874},{"textAlign":19},[3875,3880,3884,3893],{"text":3876,"type":80,"marks":3877},"Healthcare has been the most expensive industry for data breaches for the",[3878],{"type":83,"attrs":3879},{"color":85},{"text":1124,"type":80,"marks":3881},[3882],{"type":83,"attrs":3883},{"color":1138},{"text":3885,"type":80,"marks":3886},"14th consecutive year",[3887,3890,3892],{"type":98,"attrs":3888},{"href":3889,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://newsroom.ibm.com/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs",{"type":83,"attrs":3891},{"color":1138},{"type":1141},{"text":3894,"type":80,"marks":3895},", averaging $9.77 million per incident, more than double any other sector. But the cost is almost a distraction from the bigger issue: technical debt creates direct, documented pathways to patient harm.",[3896],{"type":83,"attrs":3897},{"color":85},{"type":75,"attrs":3899,"content":3900},{"textAlign":19},[3901,3906,3913,3921],{"text":3902,"type":80,"marks":3903},"The",[3904],{"type":83,"attrs":3905},{"color":85},{"text":1124,"type":80,"marks":3907},[3908,3911],{"type":98,"attrs":3909},{"href":3910,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.nixonpeabody.com/insights/articles/2024/03/05/the-change-healthcare-cybersecurity-breach",{"type":83,"attrs":3912},{"color":85},{"text":3914,"type":80,"marks":3915},"Change Healthcare attack of 2024",[3916,3918,3920],{"type":98,"attrs":3917},{"href":3910,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3919},{"color":1138},{"type":1141},{"text":3922,"type":80,"marks":3923}," proves the point. No MFA on a legacy remote access portal. Systems dating back 40 years. 74% of US hospitals impacted. $100 million in daily provider losses. $22 million ransom paid. The technical debt was the vulnerability. The cyberattack was just the trigger.",[3924],{"type":83,"attrs":3925},{"color":85},{"type":75,"attrs":3927,"content":3928},{"textAlign":19},[3929,3934,3943,3948,3952,3961],{"text":3930,"type":80,"marks":3931},"And the liability doesn't work like it does in SaaS. The DOJ's",[3932],{"type":83,"attrs":3933},{"color":85},{"text":3935,"type":80,"marks":3936}," Civil Cyber-Fraud Initiative",[3937,3940,3942],{"type":98,"attrs":3938},{"href":3939,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.skadden.com/insights/publications/2023/11/the-nucleus",{"type":83,"attrs":3941},{"color":1138},{"type":1141},{"text":3944,"type":80,"marks":3945}," means insecure architecture can now trigger federal prosecution under the False Claims Act.",[3946],{"type":83,"attrs":3947},{"color":85},{"text":1124,"type":80,"marks":3949},[3950],{"type":83,"attrs":3951},{"color":1138},{"text":3953,"type":80,"marks":3954},"Practice Fusion paid $145 million",[3955,3958,3960],{"type":98,"attrs":3956},{"href":3957,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.justice.gov/archives/opa/pr/electronic-health-records-vendor-pay-145-million-resolve-criminal-and-civil-investigations-0",{"type":83,"attrs":3959},{"color":1138},{"type":1141},{"text":3962,"type":80,"marks":3963}," and entered a criminal deferred prosecution agreement.",[3964],{"type":83,"attrs":3965},{"color":85},{"type":75,"attrs":3967,"content":3968},{"textAlign":19},[3969],{"text":3970,"type":80,"marks":3971},"That's the liability ceiling in this industry, and no PR strategy gets you out from under it.",[3972],{"type":83,"attrs":3973},{"color":85},{"type":580,"attrs":3975,"content":3976},{"level":633,"textAlign":19},[3977],{"text":3978,"type":80,"marks":3979},"Why Do Founders Underestimate Scaling Under Compliance?",[3980,3982],{"type":83,"attrs":3981},{"color":85},{"type":99},{"type":75,"attrs":3984,"content":3985},{"textAlign":19},[3986],{"text":3987,"type":80,"marks":3988},"In most startup categories, scaling is primarily an engineering challenge. In health tech, it's an engineering challenge wrapped in a compliance obligation at every layer.",[3989],{"type":83,"attrs":3990},{"color":85},{"type":75,"attrs":3992,"content":3993},{"textAlign":19},[3994],{"text":3995,"type":80,"marks":3996},"You can't take the system down to fix it. A minute of downtime in a mid-sized hospital costs up to $7,500 in operational losses alone, and that's before the clinical consequences. Healthcare applications serving active workflows must maintain near-total uptime, which means every architectural intervention has to happen while the system is live. There are no maintenance windows. No \"we'll roll it back if it breaks.\" Every refactor, every migration, every infrastructure change has to be planned for zero disruption.",[3997],{"type":83,"attrs":3998},{"color":85},{"type":75,"attrs":4000,"content":4001},{"textAlign":19},[4002],{"text":4003,"type":80,"marks":4004},"This is why accumulating MVP technical debt makes architectural work so difficult to address later. The problems aren't harder to fix. The window for fixing them safely is much smaller.",[4005],{"type":83,"attrs":4006},{"color":85},{"type":580,"attrs":4008,"content":4009},{"level":633,"textAlign":19},[4010],{"text":4011,"type":80,"marks":4012},"How Does Technical Debt Become a Fundraising Red Flag?",[4013,4015],{"type":83,"attrs":4014},{"color":85},{"type":99},{"type":75,"attrs":4017,"content":4018},{"textAlign":19},[4019],{"text":4020,"type":80,"marks":4021},"Investors never care about the code. What they're actually assessing is whether the software can handle 10x growth without a replatform, and whether the team running it can be trusted to get there. A codebase where knowledge is concentrated in one developer, deployments are manual, and nobody has documented the architecture, isn't a technical problem in their eyes. It's a leadership and operational risk signal.",[4022],{"type":83,"attrs":4023},{"color":85},{"type":75,"attrs":4025,"content":4026},{"textAlign":19},[4027,4032,4041],{"text":4028,"type":80,"marks":4029},"In health tech, that scrutiny gets a second layer. Healthcare investors now routinely probe these areas during ",[4030],{"type":83,"attrs":4031},{"color":85},{"text":4033,"type":80,"marks":4034},"acquisition due diligence",[4035,4038,4040],{"type":98,"attrs":4036},{"href":4037,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://clinxacademy.com/blog/acquisition-due-diligence-checklist",{"type":83,"attrs":4039},{"color":1138},{"type":1141},{"text":4042,"type":80,"marks":4043},": FHIR version support and migration path, PHI handling architecture, audit log infrastructure, and active compliance posture. Weak answers in these areas directly affect operations, regulatory standing, and enterprise trust.",[4044],{"type":83,"attrs":4045},{"color":85},{"type":75,"attrs":4047,"content":4048},{"textAlign":19},[4049],{"text":4050,"type":80,"marks":4051},"A gap in any one of them doesn't just invite a valuation haircut. It raises the question of whether the product can be sold to hospitals at all.",[4052],{"type":83,"attrs":4053},{"color":85},{"type":75,"attrs":4055},{"textAlign":19},{"type":623,"attrs":4057},{"id":3546,"body":4058},[4059],{"_uid":4060,"margin":1153,"component":1154},"i-7ff5a1c5-8664-47a2-86ef-d311755d2722",{"type":580,"attrs":4062,"content":4063},{"level":582,"textAlign":19},[4064],{"text":4065,"type":80,"marks":4066},"What Are the Hidden Costs of Technical Debt: Growth, Funding, and Compliance Risks?",[4067,4069],{"type":83,"attrs":4068},{"color":85},{"type":99},{"type":75,"attrs":4071,"content":4072},{"textAlign":19},[4073,4078,4084],{"text":4074,"type":80,"marks":4075},"The previous section showed ",[4076],{"type":83,"attrs":4077},{"color":85},{"text":4079,"type":80,"marks":4080},"why",[4081,4083],{"type":83,"attrs":4082},{"color":85},{"type":614},{"text":4085,"type":80,"marks":4086}," health tech is structurally different. This one answers a more practical question: what does unmanaged technical debt actually cost you, and where does it show up first?",[4087],{"type":83,"attrs":4088},{"color":85},{"type":75,"attrs":4090,"content":4091},{"textAlign":19},[4092,4097,4098,4099],{"text":4093,"type":80,"marks":4094},"It shows up in three areas that founders consistently underestimate until it's too late. And the dangerous part is they don't stay separate.",[4095],{"type":83,"attrs":4096},{"color":85},{"type":3609},{"type":3609},{"text":4100,"type":80},"Technical debt shows up in three distinct business areas, each with compounding consequences:",{"type":2283,"content":4102},[4103,4145,4183,4221],{"type":2286,"content":4104},[4105,4118,4132],{"type":2317,"attrs":4106,"content":4107},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4108],{"type":75,"attrs":4109,"content":4111},{"textAlign":4110},"center",[4112],{"text":4113,"type":80,"marks":4114},"Risk area",[4115,4117],{"type":83,"attrs":4116},{"color":85},{"type":99},{"type":2317,"attrs":4119,"content":4122},{"colspan":2291,"rowspan":2291,"colwidth":4120,"backgroundColor":19},[4121],264,[4123],{"type":75,"attrs":4124,"content":4125},{"textAlign":4110},[4126],{"text":4127,"type":80,"marks":4128},"How technical debt shows up",[4129,4131],{"type":83,"attrs":4130},{"color":85},{"type":99},{"type":2317,"attrs":4133,"content":4135},{"colspan":2291,"rowspan":2291,"colwidth":4134,"backgroundColor":19},[4121],[4136],{"type":75,"attrs":4137,"content":4138},{"textAlign":4110},[4139],{"text":4140,"type":80,"marks":4141},"The real-world consequence",[4142,4144],{"type":83,"attrs":4143},{"color":85},{"type":99},{"type":2286,"content":4146},[4147,4159,4171],{"type":2317,"attrs":4148,"content":4149},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4150],{"type":75,"attrs":4151,"content":4152},{"textAlign":19},[4153],{"text":4154,"type":80,"marks":4155},"Growth",[4156,4158],{"type":83,"attrs":4157},{"color":85},{"type":99},{"type":2317,"attrs":4160,"content":4162},{"colspan":2291,"rowspan":2291,"colwidth":4161,"backgroundColor":19},[4121],[4163],{"type":75,"attrs":4164,"content":4165},{"textAlign":19},[4166],{"text":4167,"type":80,"marks":4168},"Features take longer to build. Engineers spend more time firefighting fragile integrations than shipping new functionality. Each new hospital customer requires a bespoke integration instead of a configuration.",[4169],{"type":83,"attrs":4170},{"color":85},{"type":2317,"attrs":4172,"content":4174},{"colspan":2291,"rowspan":2291,"colwidth":4173,"backgroundColor":19},[4121],[4175],{"type":75,"attrs":4176,"content":4177},{"textAlign":19},[4178],{"text":4179,"type":80,"marks":4180},"Competitors move faster. Enterprise deals stall. The roadmap slips because the codebase is fighting every change.",[4181],{"type":83,"attrs":4182},{"color":85},{"type":2286,"content":4184},[4185,4197,4209],{"type":2317,"attrs":4186,"content":4187},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4188],{"type":75,"attrs":4189,"content":4190},{"textAlign":19},[4191],{"text":4192,"type":80,"marks":4193},"Funding",[4194,4196],{"type":83,"attrs":4195},{"color":85},{"type":99},{"type":2317,"attrs":4198,"content":4200},{"colspan":2291,"rowspan":2291,"colwidth":4199,"backgroundColor":19},[4121],[4201],{"type":75,"attrs":4202,"content":4203},{"textAlign":19},[4204],{"text":4205,"type":80,"marks":4206},"Investors find undocumented architecture, no CI/CD pipeline, knowledge concentrated in one developer, missing audit logs, and no FHIR migration path.",[4207],{"type":83,"attrs":4208},{"color":85},{"type":2317,"attrs":4210,"content":4212},{"colspan":2291,"rowspan":2291,"colwidth":4211,"backgroundColor":19},[4121],[4213],{"type":75,"attrs":4214,"content":4215},{"textAlign":19},[4216],{"text":4217,"type":80,"marks":4218},"In health tech, deals get killed. Compliance gaps raise questions about whether the product can be sold to hospitals at all.",[4219],{"type":83,"attrs":4220},{"color":85},{"type":2286,"content":4222},[4223,4235,4247],{"type":2317,"attrs":4224,"content":4225},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4226],{"type":75,"attrs":4227,"content":4228},{"textAlign":19},[4229],{"text":4230,"type":80,"marks":4231},"Compliance",[4232,4234],{"type":83,"attrs":4233},{"color":85},{"type":99},{"type":2317,"attrs":4236,"content":4238},{"colspan":2291,"rowspan":2291,"colwidth":4237,"backgroundColor":19},[4121],[4239],{"type":75,"attrs":4240,"content":4241},{"textAlign":19},[4242],{"text":4243,"type":80,"marks":4244},"Security vulnerabilities accumulate in deferred encryption, missing MFA, and unaudited PHI access paths. Audit trails don't exist or can't be queried on demand.",[4245],{"type":83,"attrs":4246},{"color":85},{"type":2317,"attrs":4248,"content":4250},{"colspan":2291,"rowspan":2291,"colwidth":4249,"backgroundColor":19},[4121],[4251],{"type":75,"attrs":4252,"content":4253},{"textAlign":19},[4254],{"text":4255,"type":80,"marks":4256},"Without audit infrastructure in place, you can't prove compliance even when you believe you're compliant, and regulators won't take your word for it.",[4257],{"type":83,"attrs":4258},{"color":85},{"type":75,"attrs":4260},{"textAlign":19},{"type":623,"attrs":4262},{"id":3546,"body":4263},[4264],{"_uid":4265,"margin":1153,"component":1154},"i-1a1aadf8-3f7d-4922-b7ce-8d7bb0e16440",{"type":75,"attrs":4267,"content":4268},{"textAlign":19},[4269],{"text":4270,"type":80,"marks":4271},"A compliance gap slows enterprise sales, delaying the revenue needed to fund the compliance fix you need before your Series A. A growth bottleneck delays the architectural work investors expect to see. ",[4272],{"type":83,"attrs":4273},{"color":85},{"type":623,"attrs":4275},{"id":3546,"body":4276},[4277],{"_uid":4278,"quote":4279,"fontSize":3580,"component":710,"accentColor":3581},"i-5f066d07-12a7-40fc-818a-7a1c858063e5",{"type":72,"content":4280},[4281,4289],{"type":75,"attrs":4282,"content":4283},{"textAlign":19},[4284],{"text":4285,"type":80,"marks":4286},"The average cost of a healthcare data breach reached $9.77 million in 2024, making it the most expensive industry for breaches for the 14th consecutive year. That figure is the real cost of deferred technical debt - not a hypothetical risk, but a documented outcome.",[4287],{"type":83,"attrs":4288},{"color":85},{"type":75,"attrs":4290,"content":4292},{"textAlign":4291},"right",[4293,4301],{"text":4294,"type":80,"marks":4295},"IBM's Cost of a Data Breach Report 2024",[4296,4298,4300],{"type":98,"attrs":4297},{"href":3889,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":4299},{"color":1138},{"type":1141},{"text":4302,"type":80,"marks":4303},", ",[4304],{"type":83,"attrs":4305},{"color":85},{"type":75,"attrs":4307},{"textAlign":4291},{"type":580,"attrs":4309,"content":4310},{"level":582,"textAlign":19},[4311],{"text":4312,"type":80,"marks":4313},"How to Identify Technical Debt in Your Health Tech Product",[4314],{"type":83,"attrs":4315},{"color":85},{"type":75,"attrs":4317,"content":4318},{"textAlign":19},[4319],{"text":4320,"type":80,"marks":4321},"Technical debt in healthcare software doesn't look like messy code. It shows up as missed deadlines, risky releases, and systems that are harder to scale than they should be.",[4322],{"type":83,"attrs":4323},{"color":85},{"type":75,"attrs":4325,"content":4326},{"textAlign":19},[4327],{"text":4328,"type":80,"marks":4329},"And by the time most health tech founders recognize it, technical debt is already slowing product development, increasing costs, and putting compliance at risk.",[4330],{"type":83,"attrs":4331},{"color":85},{"type":580,"attrs":4333,"content":4334},{"level":633,"textAlign":19},[4335],{"text":4336,"type":80,"marks":4337},"Is your product getting harder to ship?",[4338,4340],{"type":83,"attrs":4339},{"color":85},{"type":99},{"type":75,"attrs":4342,"content":4343},{"textAlign":19},[4344],{"text":4345,"type":80,"marks":4346},"Features that once took a week now take a month. Releases feel unpredictable. Small changes break unrelated parts of the system.",[4347],{"type":83,"attrs":4348},{"color":85},{"type":75,"attrs":4350,"content":4351},{"textAlign":19},[4352],{"text":4353,"type":80,"marks":4354},"This isn't just growing complexity. It's accumulated technical debt in your software architecture.",[4355],{"type":83,"attrs":4356},{"color":85},{"type":75,"attrs":4358,"content":4359},{"textAlign":19},[4360],{"text":4361,"type":80,"marks":4362},"Your engineering team isn't slower. Your system is inefficient.",[4363],{"type":83,"attrs":4364},{"color":85},{"type":580,"attrs":4366,"content":4367},{"level":633,"textAlign":19},[4368],{"text":4369,"type":80,"marks":4370},"Is your engineering team stuck maintaining instead of building?",[4371,4373],{"type":83,"attrs":4372},{"color":85},{"type":99},{"type":75,"attrs":4375,"content":4376},{"textAlign":19},[4377],{"text":4378,"type":80,"marks":4379},"If most of your engineering time goes into bug fixing, maintenance, and firefighting instead of building new features, you're dealing with technical debt.",[4380],{"type":83,"attrs":4381},{"color":85},{"type":75,"attrs":4383,"content":4384},{"textAlign":19},[4385],{"text":4386,"type":80,"marks":4387},"New developers take too long to onboard because system knowledge isn't documented. Instead, it lives in silos.",[4388],{"type":83,"attrs":4389},{"color":85},{"type":75,"attrs":4391,"content":4392},{"textAlign":19},[4393],{"text":4394,"type":80,"marks":4395},"This is one of the most common technical debt examples in health tech: undocumented systems that don't scale with the team.",[4396],{"type":83,"attrs":4397},{"color":85},{"type":580,"attrs":4399,"content":4400},{"level":633,"textAlign":19},[4401],{"text":4402,"type":80,"marks":4403},"How Does Technical Debt Impact Health Tech Scalability?",[4404,4406],{"type":83,"attrs":4405},{"color":85},{"type":99},{"type":75,"attrs":4408,"content":4409},{"textAlign":19},[4410],{"text":4411,"type":80,"marks":4412},"Fragile healthcare software architecture becomes visible when it limits growth:",[4413],{"type":83,"attrs":4414},{"color":85},{"type":642,"content":4416},[4417,4427,4437],{"type":645,"content":4418},[4419],{"type":75,"attrs":4420,"content":4421},{"textAlign":19},[4422],{"text":4423,"type":80,"marks":4424},"Every new hospital or clinic requires custom integrations",[4425],{"type":83,"attrs":4426},{"color":85},{"type":645,"content":4428},[4429],{"type":75,"attrs":4430,"content":4431},{"textAlign":19},[4432],{"text":4433,"type":80,"marks":4434},"Adding features creates regressions in other parts of the system",[4435],{"type":83,"attrs":4436},{"color":85},{"type":645,"content":4438},[4439],{"type":75,"attrs":4440,"content":4441},{"textAlign":19},[4442],{"text":4443,"type":80,"marks":4444},"You lack clear visibility into how patient data flows",[4445],{"type":83,"attrs":4446},{"color":85},{"type":75,"attrs":4448,"content":4449},{"textAlign":19},[4450],{"text":4451,"type":80,"marks":4452},"In healthcare software development, this is more than inefficiency. It's a compliance and security risk.",[4453],{"type":83,"attrs":4454},{"color":85},{"type":580,"attrs":4456,"content":4457},{"level":633,"textAlign":19},[4458],{"text":4459,"type":80,"marks":4460},"What does your team's language reveal about hidden technical debt?",[4461,4463],{"type":83,"attrs":4462},{"color":85},{"type":99},{"type":75,"attrs":4465,"content":4466},{"textAlign":19},[4467],{"text":4468,"type":80,"marks":4469},"Pay attention to how your team talks about the codebase:",[4470],{"type":83,"attrs":4471},{"color":85},{"type":642,"content":4473},[4474,4484,4494],{"type":645,"content":4475},[4476],{"type":75,"attrs":4477,"content":4478},{"textAlign":19},[4479],{"text":4480,"type":80,"marks":4481},"\"Only one person understands this part\"",[4482],{"type":83,"attrs":4483},{"color":85},{"type":645,"content":4485},[4486],{"type":75,"attrs":4487,"content":4488},{"textAlign":19},[4489],{"text":4490,"type":80,"marks":4491},"\"We'll fix it after the next funding round\"",[4492],{"type":83,"attrs":4493},{"color":85},{"type":645,"content":4495},[4496],{"type":75,"attrs":4497,"content":4498},{"textAlign":19},[4499],{"text":4500,"type":80,"marks":4501},"\"It works for now\"",[4502],{"type":83,"attrs":4503},{"color":85},{"type":75,"attrs":4505,"content":4506},{"textAlign":19},[4507,4512,4516,4525,4530],{"text":4508,"type":80,"marks":4509},"These are classic technical debt signals. They indicate a lack of ownership, documentation, and long-term planning. Getting the",[4510],{"type":83,"attrs":4511},{"color":85},{"text":1124,"type":80,"marks":4513},[4514],{"type":83,"attrs":4515},{"color":1138},{"text":4517,"type":80,"marks":4518},"essential aspects of healthcare software architecture",[4519,4522,4524],{"type":98,"attrs":4520},{"href":4521,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/successful-healthcare-app-development",{"type":83,"attrs":4523},{"color":1138},{"type":1141},{"text":1124,"type":80,"marks":4526},[4527,4529],{"type":83,"attrs":4528},{"color":1138},{"type":1141},{"text":4531,"type":80,"marks":4532},"right from the start prevents most of them.",[4533],{"type":83,"attrs":4534},{"color":85},{"type":75,"attrs":4536},{"textAlign":19},{"type":623,"attrs":4538},{"id":3546,"body":4539},[4540],{"_uid":4541,"margin":1153,"component":1154},"i-c5adaddd-4722-4bf0-8891-afa7a68c77a4",{"type":580,"attrs":4543,"content":4544},{"level":582,"textAlign":19},[4545],{"text":4546,"type":80,"marks":4547},"The Founder's Decision: Rewrite or Refactor?",[4548],{"type":83,"attrs":4549},{"color":85},{"type":75,"attrs":4551,"content":4552},{"textAlign":19},[4553],{"text":4554,"type":80,"marks":4555},"When technical debt becomes impossible to ignore, most founders jump to the same conclusion: we need to rewrite everything. It's almost always the wrong call, and in health tech, where you can't take the system offline and your compliance posture is under constant scrutiny, it's even riskier than in other industries.",[4556],{"type":83,"attrs":4557},{"color":85},{"type":75,"attrs":4559,"content":4560},{"textAlign":19},[4561,4565,4574],{"text":1466,"type":80,"marks":4562},[4563],{"type":83,"attrs":4564},{"color":85},{"text":4566,"type":80,"marks":4567},"Increment's engineering experts",[4568,4571,4573],{"type":98,"attrs":4569},{"href":4570,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://increment.com/software-architecture/ask-an-expert-upgrade-outdated-codebase/",{"type":83,"attrs":4572},{"color":1138},{"type":1141},{"text":4575,"type":80,"marks":4576}," put it, total rewrites are time-consuming, costly, and carry a specific danger that's easy to underestimate: you may end up with a product that's unfit for release for months or years, with nothing to show investors or customers in the meantime.",[4577],{"type":83,"attrs":4578},{"color":85},{"type":75,"attrs":4580,"content":4581},{"textAlign":19},[4582],{"text":4583,"type":80,"marks":4584},"So before you make the call, here's how to think about it.",[4585],{"type":83,"attrs":4586},{"color":85},{"type":580,"attrs":4588,"content":4589},{"level":633,"textAlign":19},[4590],{"text":4591,"type":80,"marks":4592},"When you should not rewrite",[4593],{"type":83,"attrs":4594},{"color":85},{"type":75,"attrs":4596,"content":4597},{"textAlign":19},[4598],{"text":4599,"type":80,"marks":4600},"If your product has early traction, limited runway, or debt that isn't blocking growth or compliance, a rewrite will cost you more than it solves. You'd be trading months of engineering time, with no customer-facing output, for an improvement a more targeted approach could achieve at a fraction of the cost.",[4601],{"type":83,"attrs":4602},{"color":85},{"type":75,"attrs":4604,"content":4605},{"textAlign":19},[4606],{"text":4607,"type":80,"marks":4608},"If the system works well enough to sell and operate, and the debt sits in specific modules rather than the core architecture, you don't need to start over. You need to be more deliberate about where you invest.",[4609],{"type":83,"attrs":4610},{"color":85},{"type":580,"attrs":4612,"content":4613},{"level":633,"textAlign":19},[4614],{"text":4615,"type":80,"marks":4616},"When a rewrite might be necessary",[4617],{"type":83,"attrs":4618},{"color":85},{"type":75,"attrs":4620,"content":4621},{"textAlign":19},[4622],{"text":4623,"type":80,"marks":4624},"There are situations where patching isn't enough. A rewrite becomes worth considering when the core data model is fundamentally incompatible with compliance requirements. For example, PHI scattered across the system with no centralized, auditable handling, where retrofitting would require touching everything anyway. Or when the technology stack is genuinely end-of-life with no active security support, making HIPAA compliance structurally impossible without starting fresh.",[4625],{"type":83,"attrs":4626},{"color":85},{"type":75,"attrs":4628,"content":4629},{"textAlign":19},[4630],{"text":4631,"type":80,"marks":4632},"These cases are rarer than founders think. But when they apply, continuing to patch is more expensive and more dangerous than rebuilding.",[4633],{"type":83,"attrs":4634},{"color":85},{"type":580,"attrs":4636,"content":4637},{"level":633,"textAlign":19},[4638],{"text":4639,"type":80,"marks":4640},"The hybrid approach ",[4641],{"type":83,"attrs":4642},{"color":85},{"type":75,"attrs":4644,"content":4645},{"textAlign":19},[4646],{"text":4647,"type":80,"marks":4648},"The most practical path for most health tech startups is neither a full rewrite nor patching indefinitely. It's incremental modernization through selective legacy code reuse: replacing the most problematic parts of the system while keeping everything else running.",[4649],{"type":83,"attrs":4650},{"color":85},{"type":75,"attrs":4652,"content":4653},{"textAlign":19},[4654,4659,4668],{"text":4655,"type":80,"marks":4656},"The most proven method for this is the ",[4657],{"type":83,"attrs":4658},{"color":85},{"text":4660,"type":80,"marks":4661},"Strangler Fig pattern",[4662,4665,4667],{"type":98,"attrs":4663},{"href":4664,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://martinfowler.com/bliki/StranglerFigApplication.html",{"type":83,"attrs":4666},{"color":1138},{"type":1141},{"text":4669,"type":80,"marks":4670},", coined by Martin Fowler. Rather than replacing the system all at once, you place a modern layer in front of the legacy architecture and gradually migrate functionality behind it, one module at a time, validated in production before the next one begins.",[4671],{"type":83,"attrs":4672},{"color":85},{"type":75,"attrs":4674,"content":4675},{"textAlign":19},[4676],{"text":4677,"type":80,"marks":4678},"In health tech, this typically means building a FHIR-compliant API layer in front of your existing EHR integrations first, improving interoperability and building a robust health tech compliance architecture without touching the rest of the product, then progressively migrating PHI handling and audit infrastructure into clean, isolated modules.",[4679],{"type":83,"attrs":4680},{"color":85},{"type":580,"attrs":4682,"content":4683},{"level":633,"textAlign":19},[4684],{"text":4685,"type":80,"marks":4686},"Legacy code reuse, refactor, or rewrite? ",[4687,4689],{"type":83,"attrs":4688},{"color":85},{"type":99},{"type":75,"attrs":4691,"content":4692},{"textAlign":19},[4693],{"text":4694,"type":80,"marks":4695},"Not sure where to start?  Use this decision tree.",[4696],{"type":83,"attrs":4697},{"color":85},{"type":75,"attrs":4699,"content":4700},{"textAlign":19},[4701],{"type":718,"attrs":4702},{"id":4703,"alt":92,"src":4704,"title":92,"source":92,"copyright":92,"meta_data":4705},164344511303807,"https://a.storyblok.com/f/202591/2816x1536/17a8cf0e2e/decision-tree.jpg",{},{"type":623,"attrs":4707},{"id":3546,"body":4708},[4709],{"_uid":4710,"margin":1153,"component":1154},"i-b4e975e6-14cf-4eec-8e6a-feaa1537841a",{"type":75,"attrs":4712},{"textAlign":19},{"type":580,"attrs":4714,"content":4715},{"level":582,"textAlign":19},[4716],{"text":4717,"type":80,"marks":4718},"A Practical Framework to Prioritize Technical Debt (Without Slowing Down)",[4719],{"type":83,"attrs":4720},{"color":85},{"type":75,"attrs":4722,"content":4723},{"textAlign":19},[4724],{"text":4725,"type":80,"marks":4726},"You've identified the debt. You know it's slowing you down. The question now is: where do you start?",[4727],{"type":83,"attrs":4728},{"color":85},{"type":75,"attrs":4730,"content":4731},{"textAlign":19},[4732],{"text":4733,"type":80,"marks":4734},"The instinct is usually to tackle the most visible problem first, the integration that keeps breaking, the module everyone avoids touching. But visible isn't the same as critical. In health tech, the most dangerous debt is often the quietest: the audit trail that was never built, the PHI handling that was never centralized, the compliance gap that won't surface until a hospital procurement team asks for documentation you don't have.",[4735],{"type":83,"attrs":4736},{"color":85},{"type":75,"attrs":4738,"content":4739},{"textAlign":19},[4740],{"text":4741,"type":80,"marks":4742},"To effectively reduce technical debt, startup founders need a prioritization framework that solves a specific problem: it stops debt reduction from being reactive, triggered by crises, and makes it predictable, budgeted, and tied to business outcomes. Here's how to build one in four steps.",[4743],{"type":83,"attrs":4744},{"color":85},{"type":580,"attrs":4746,"content":4747},{"level":633,"textAlign":19},[4748],{"text":4749,"type":80,"marks":4750},"1. Classify debt: critical vs non-critical",[4751],{"type":83,"attrs":4752},{"color":1445},{"type":75,"attrs":4754,"content":4755},{"textAlign":19},[4756],{"text":4757,"type":80,"marks":4758},"Start by separating debt that is actively blocking something from debt that is just untidy. Critical debt slows feature delivery, creates compliance exposure, or will surface during investor due diligence. Non-critical debt is cosmetic: messy code, outdated dependencies, missing documentation that doesn't yet affect your ability to operate or grow.",[4759],{"type":83,"attrs":4760},{"color":85},{"type":580,"attrs":4762,"content":4763},{"level":633,"textAlign":19},[4764],{"text":4765,"type":80,"marks":4766},"2. Map debt to business risk",[4767],{"type":83,"attrs":4768},{"color":1445},{"type":75,"attrs":4770,"content":4771},{"textAlign":19},[4772],{"text":4773,"type":80,"marks":4774},"Once classified, rank critical debt by the type of risk it creates.",[4775],{"type":83,"attrs":4776},{"color":85},{"type":642,"content":4778},[4779,4789,4799],{"type":645,"content":4780},[4781],{"type":75,"attrs":4782,"content":4783},{"textAlign":19},[4784],{"text":4785,"type":80,"marks":4786},"Compliance risk comes first. A missing audit trail or unencrypted PHI path is a potential HIPAA violation accumulating daily.",[4787],{"type":83,"attrs":4788},{"color":85},{"type":645,"content":4790},[4791],{"type":75,"attrs":4792,"content":4793},{"textAlign":19},[4794],{"text":4795,"type":80,"marks":4796},"Revenue risk comes second. Debt that is slowing down enterprise onboarding or blocking a key integration is directly costing you deals.",[4797],{"type":83,"attrs":4798},{"color":85},{"type":645,"content":4800},[4801],{"type":75,"attrs":4802,"content":4803},{"textAlign":19},[4804],{"text":4805,"type":80,"marks":4806},"Funding risk comes third. Architecture gaps that will surface in Series A due diligence need to be addressed before the process starts, not during it.",[4807],{"type":83,"attrs":4808},{"color":85},{"type":580,"attrs":4810,"content":4811},{"level":633,"textAlign":19},[4812],{"text":4813,"type":80,"marks":4814},"3. Use the Now / Next / Later model",[4815],{"type":83,"attrs":4816},{"color":1445},{"type":75,"attrs":4818,"content":4819},{"textAlign":19},[4820],{"text":4821,"type":80,"marks":4822},"With debt ranked by risk, assign each item to a time horizon:",[4823],{"type":83,"attrs":4824},{"color":85},{"type":2283,"content":4826},[4827,4862,4900,4938],{"type":2286,"content":4828},[4829,4834,4848],{"type":2317,"attrs":4830,"content":4831},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4832],{"type":75,"attrs":4833},{"textAlign":19},{"type":2317,"attrs":4835,"content":4838},{"colspan":2291,"rowspan":2291,"colwidth":4836,"backgroundColor":19},[4837],306,[4839],{"type":75,"attrs":4840,"content":4841},{"textAlign":4110},[4842],{"text":4843,"type":80,"marks":4844},"What belongs here",[4845,4847],{"type":83,"attrs":4846},{"color":85},{"type":99},{"type":2317,"attrs":4849,"content":4852},{"colspan":2291,"rowspan":2291,"colwidth":4850,"backgroundColor":19},[4851],281,[4853],{"type":75,"attrs":4854,"content":4855},{"textAlign":4110},[4856],{"text":4857,"type":80,"marks":4858},"Example",[4859,4861],{"type":83,"attrs":4860},{"color":85},{"type":99},{"type":2286,"content":4863},[4864,4876,4888],{"type":2317,"attrs":4865,"content":4866},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4867],{"type":75,"attrs":4868,"content":4869},{"textAlign":19},[4870],{"text":4871,"type":80,"marks":4872},"Now",[4873,4875],{"type":83,"attrs":4874},{"color":85},{"type":99},{"type":2317,"attrs":4877,"content":4879},{"colspan":2291,"rowspan":2291,"colwidth":4878,"backgroundColor":19},[4837],[4880],{"type":75,"attrs":4881,"content":4882},{"textAlign":19},[4883],{"text":4884,"type":80,"marks":4885},"Anything creating active compliance exposure or blocking a current sprint goal",[4886],{"type":83,"attrs":4887},{"color":85},{"type":2317,"attrs":4889,"content":4891},{"colspan":2291,"rowspan":2291,"colwidth":4890,"backgroundColor":19},[4851],[4892],{"type":75,"attrs":4893,"content":4894},{"textAlign":19},[4895],{"text":4896,"type":80,"marks":4897},"Missing audit logs before a hospital procurement review",[4898],{"type":83,"attrs":4899},{"color":85},{"type":2286,"content":4901},[4902,4914,4926],{"type":2317,"attrs":4903,"content":4904},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4905],{"type":75,"attrs":4906,"content":4907},{"textAlign":19},[4908],{"text":4909,"type":80,"marks":4910},"Next",[4911,4913],{"type":83,"attrs":4912},{"color":85},{"type":99},{"type":2317,"attrs":4915,"content":4917},{"colspan":2291,"rowspan":2291,"colwidth":4916,"backgroundColor":19},[4837],[4918],{"type":75,"attrs":4919,"content":4920},{"textAlign":19},[4921],{"text":4922,"type":80,"marks":4923},"Debt in modules where your next product milestone depends on clean architecture",[4924],{"type":83,"attrs":4925},{"color":85},{"type":2317,"attrs":4927,"content":4929},{"colspan":2291,"rowspan":2291,"colwidth":4928,"backgroundColor":19},[4851],[4930],{"type":75,"attrs":4931,"content":4932},{"textAlign":19},[4933],{"text":4934,"type":80,"marks":4935},"EHR integration layer before onboarding your next enterprise customer",[4936],{"type":83,"attrs":4937},{"color":85},{"type":2286,"content":4939},[4940,4952,4964],{"type":2317,"attrs":4941,"content":4942},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4943],{"type":75,"attrs":4944,"content":4945},{"textAlign":19},[4946],{"text":4947,"type":80,"marks":4948},"Later",[4949,4951],{"type":83,"attrs":4950},{"color":85},{"type":99},{"type":2317,"attrs":4953,"content":4955},{"colspan":2291,"rowspan":2291,"colwidth":4954,"backgroundColor":19},[4837],[4956],{"type":75,"attrs":4957,"content":4958},{"textAlign":19},[4959],{"text":4960,"type":80,"marks":4961},"Cosmetic or low-impact debt with no near-term consequence",[4962],{"type":83,"attrs":4963},{"color":85},{"type":2317,"attrs":4965,"content":4967},{"colspan":2291,"rowspan":2291,"colwidth":4966,"backgroundColor":19},[4851],[4968],{"type":75,"attrs":4969,"content":4970},{"textAlign":19},[4971],{"text":4972,"type":80,"marks":4973},"Outdated internal tooling, minor code inconsistencies",[4974],{"type":83,"attrs":4975},{"color":85},{"type":75,"attrs":4977},{"textAlign":19},{"type":623,"attrs":4979},{"id":3546,"body":4980},[4981],{"_uid":4982,"margin":1153,"component":1154},"i-a84b50f7-f7ec-44d5-b0cf-ff49fda67f91",{"type":580,"attrs":4984,"content":4985},{"level":633,"textAlign":19},[4986],{"text":4987,"type":80,"marks":4988},"4. Align with your product roadmap",[4989],{"type":83,"attrs":4990},{"color":1445},{"type":75,"attrs":4992,"content":4993},{"textAlign":19},[4994],{"text":4995,"type":80,"marks":4996},"The final step is the most important: fix debt where your growth depends on it. If your next enterprise customer requires a bidirectional integration, the architecture layer is your highest-priority debt, regardless of its rank on a technical complexity scale.",[4997],{"type":83,"attrs":4998},{"color":85},{"type":75,"attrs":5000,"content":5001},{"textAlign":19},[5002],{"text":5003,"type":80,"marks":5004},"If your Series A is six months away, audit log infrastructure and CI/CD pipeline are priorities one and two.",[5005],{"type":83,"attrs":5006},{"color":85},{"type":75,"attrs":5008,"content":5009},{"textAlign":19},[5010],{"text":5011,"type":80,"marks":5012},"Debt reduction should always be traceable to a product or business outcome. If you can't explain why a piece of debt matters to your roadmap, it belongs in \"Later.\"",[5013],{"type":83,"attrs":5014},{"color":85},{"type":75,"attrs":5016},{"textAlign":19},{"type":623,"attrs":5018},{"id":3546,"body":5019},[5020],{"_uid":5021,"margin":1153,"component":1154},"i-795dd8db-684d-45b6-be9a-6222c4c19fb8",{"type":580,"attrs":5023,"content":5024},{"level":582,"textAlign":19},[5025],{"text":5026,"type":80,"marks":5027},"How to Resolve Technical Debt Without Killing Velocity",[5028],{"type":83,"attrs":5029},{"color":85},{"type":75,"attrs":5031,"content":5032},{"textAlign":19},[5033],{"text":5034,"type":80,"marks":5035},"Addressing technical debt doesn't have to mean slowing down. The teams that do it well treat improvement as a parallel track, not a pause.",[5036],{"type":83,"attrs":5037},{"color":85},{"type":580,"attrs":5039,"content":5040},{"level":633,"textAlign":19},[5041],{"text":5042,"type":80,"marks":5043},"Build a parallel improvement track",[5044],{"type":83,"attrs":5045},{"color":85},{"type":75,"attrs":5047,"content":5048},{"textAlign":19},[5049],{"text":5050,"type":80,"marks":5051},"The most common mistake is treating debt reduction as a separate project that competes with feature development. It's not. It's a fixed allocation within normal sprints. Dedicate a protected percentage of engineering capacity every sprint to debt, and make it non-negotiable. When debt reduction is scheduled alongside features rather than instead of them, it gets done consistently without the drama of a \"debt sprint\" that never arrives.",[5052],{"type":83,"attrs":5053},{"color":85},{"type":580,"attrs":5055,"content":5056},{"level":633,"textAlign":19},[5057],{"text":5058,"type":80,"marks":5059},"Introduce scalable architecture gradually",[5060],{"type":83,"attrs":5061},{"color":85},{"type":75,"attrs":5063,"content":5064},{"textAlign":19},[5065],{"text":5066,"type":80,"marks":5067},"You don't need to redesign your entire system to improve it. Start by decoupling the components where growth is most constrained, typically your EHR integration layer and PHI handling modules. Introduce a compliant API layer in front of legacy integrations. Move toward modular services incrementally. Each improvement compounds: a cleaner integration layer makes the next hospital onboarding faster, which makes the next one faster still.",[5068],{"type":83,"attrs":5069},{"color":85},{"type":580,"attrs":5071,"content":5072},{"level":633,"textAlign":19},[5073],{"text":5074,"type":80,"marks":5075},"Invest in testing and observability",[5076],{"type":83,"attrs":5077},{"color":85},{"type":75,"attrs":5079,"content":5080},{"textAlign":19},[5081],{"text":5082,"type":80,"marks":5083},"Automated testing on compliance-critical paths catches regressions before they become incidents. Structured logging and alerting give you visibility into how the system actually behaves under load. These aren't nice-to-haves; they're the infrastructure that prevents new debt from forming as fast as you pay down the old.",[5084],{"type":83,"attrs":5085},{"color":85},{"type":580,"attrs":5087,"content":5088},{"level":633,"textAlign":19},[5089],{"text":5090,"type":80,"marks":5091},"Bring in external expertise when needed",[5092],{"type":83,"attrs":5093},{"color":85},{"type":75,"attrs":5095,"content":5096},{"textAlign":19},[5097],{"text":5098,"type":80,"marks":5099},"Sometimes the gap between your current architecture and where you need to be is too large to close with your existing team, either because the knowledge doesn't exist internally or because hiring takes longer than the problem allows. Healthcare-specific technical debt is more complex than general-purpose debt precisely because of the regulatory overlay: a generalist engineer cannot assess HIPAA compliance gaps without domain experience.",[5100],{"type":83,"attrs":5101},{"color":85},{"type":75,"attrs":5103,"content":5104},{"textAlign":19},[5105,5110,5119],{"text":5106,"type":80,"marks":5107},"External expertise, whether a fractional CTO, a specialist consultancy, or a healthcare-focused engineering partner, can compress timelines significantly and de-risk the process in ways that internal hiring cannot match on a startup timeline. The lessons from ",[5108],{"type":83,"attrs":5109},{"color":85},{"text":5111,"type":80,"marks":5112},"scaling healthcare startups",[5113,5116,5118],{"type":98,"attrs":5114},{"href":5115,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/scaling-from-startup-to-enterprise",{"type":83,"attrs":5117},{"color":1138},{"type":1141},{"text":5120,"type":80,"marks":5121}," into enterprise-grade products show how targeted external support accelerates this transition.",[5122],{"type":83,"attrs":5123},{"color":85},{"type":580,"attrs":5125},{"level":582,"textAlign":19},{"type":623,"attrs":5127},{"id":3546,"body":5128},[5129],{"_uid":5130,"quote":5131,"fontSize":5184,"component":710,"accentColor":5185},"i-534b69f0-1fe5-41c8-8e08-1b058ce5fa02",{"type":72,"content":5132},[5133,5142],{"type":75,"attrs":5134,"content":5135},{"textAlign":19},[5136],{"text":5137,"type":80,"marks":5138},"Key Takeaways",[5139,5141],{"type":83,"attrs":5140},{"color":85},{"type":99},{"type":642,"content":5143},[5144,5154,5164,5174],{"type":645,"content":5145},[5146],{"type":75,"attrs":5147,"content":5148},{"textAlign":19},[5149],{"text":5150,"type":80,"marks":5151},"In health tech, technical debt creates legal and regulatory exposure that doesn't exist in other startup categories. Deferred compliance isn't just inefficient; it's potentially criminal.",[5152],{"type":83,"attrs":5153},{"color":85},{"type":645,"content":5155},[5156],{"type":75,"attrs":5157,"content":5158},{"textAlign":19},[5159],{"text":5160,"type":80,"marks":5161},"The most dangerous debt is often the quietest: missing audit trails, unencrypted PHI paths, and point-to-point EHR integrations that multiply with every new customer.",[5162],{"type":83,"attrs":5163},{"color":85},{"type":645,"content":5165},[5166],{"type":75,"attrs":5167,"content":5168},{"textAlign":19},[5169],{"text":5170,"type":80,"marks":5171},"A full rewrite is almost never the answer. Incremental modernization using the Strangler Fig pattern lets you improve the system without taking it offline or stalling the roadmap.",[5172],{"type":83,"attrs":5173},{"color":85},{"type":645,"content":5175},[5176],{"type":75,"attrs":5177,"content":5178},{"textAlign":19},[5179],{"text":5180,"type":80,"marks":5181},"Technical debt is a business variable, not a technical one. The founders who scale successfully are the ones who manage it deliberately, continuously, and before it forces the issue.",[5182],{"type":83,"attrs":5183},{"color":85},"text-20 md:text-22","red",{"type":580,"attrs":5187,"content":5188},{"level":582,"textAlign":19},[5189],{"text":5190,"type":80,"marks":5191},"Technical Debt Is a Strategic Decision, Not a Technical One",[5192],{"type":83,"attrs":5193},{"color":85},{"type":75,"attrs":5195,"content":5196},{"textAlign":19},[5197],{"text":5198,"type":80,"marks":5199},"Remember the slogan we started with? \"Move fast and break things.\" In healthcare, the things you break can be patient records, compliance certifications, enterprise deals, and funding rounds. The speed you gain in month three can cost you the company in year two.",[5200],{"type":83,"attrs":5201},{"color":85},{"type":75,"attrs":5203,"content":5204},{"textAlign":19},[5205],{"text":5206,"type":80,"marks":5207},"But this isn't an argument for moving slowly. It's an argument for moving deliberately.",[5208],{"type":83,"attrs":5209},{"color":85},{"type":75,"attrs":5211,"content":5212},{"textAlign":19},[5213],{"text":5214,"type":80,"marks":5215},"The founders who manage this well don't rewrite everything or ignore everything. They build a framework for deciding what matters now, what can wait, and what will quietly become existential if left unaddressed. They treat compliance as a prerequisite for growth, not a constraint on it. They design systems that are honest about their limitations, not ones that look clean in a demo but collapse under the weight of a real enterprise customer.",[5216],{"type":83,"attrs":5217},{"color":85},{"type":75,"attrs":5219,"content":5220},{"textAlign":19},[5221],{"text":5222,"type":80,"marks":5223},"Technical debt in health tech is not a code problem. It's a business variable. That is why having a proactive startup tech debt strategy is essential for long-term survival. The companies that scale are the ones that managed it like one: continuously, deliberately, and before it was forced.",[5224],{"type":83,"attrs":5225},{"color":85},{"type":75,"attrs":5227,"content":5228},{"textAlign":19},[5229],{"text":5230,"type":80,"marks":5231},"And the smartest thing you can do about it is start now. The debt you have today is the cheapest version you'll ever pay. Every month you wait, the cost goes up, the window gets smaller, and the options narrow. A deliberate startup tech debt strategy built on architecture-first thinking, documentation standards, clear decisions about when to hire and when to partner, and continuous debt monitoring isn't overhead. It's the operating system of a company that scales.",[5232],{"type":83,"attrs":5233},{"color":85},{"type":623,"attrs":5235},{"id":3546,"body":5236},[5237],{"_uid":5238,"margin":1153,"component":1154},"i-bbf1f7b2-7f52-48f7-9f2d-8491ac09d21f",{"_uid":5240,"items":5241,"title":5263,"component":5264},"bc81603c-8d24-4ba8-aa22-20adcdeae389",[5242,5247,5251,5255,5259],{"_uid":5243,"title":5244,"component":5245,"description":5246},"7154d36a-d95e-4fbe-8ab5-57d83842b764","How do I know if my startup has too much technical debt?","FaqSectionItem","Watch how your team works, not how the code looks. Features taking twice as long as they used to, engineers avoiding certain parts of the system, new hires taking weeks to get productive: these are the real signals. In health tech, ask one more question: can you produce a full audit trail of patient data access on demand? If not, you already have a compliance problem.",{"_uid":5248,"title":5249,"component":5245,"description":5250},"d85d3ad7-d848-4ebd-80d8-5ba3ef5a7149","Should I rewrite my MVP before scaling?","Almost never. A full rewrite freezes your roadmap for months with nothing to show customers or investors. The better move is to identify which specific parts of your system are blocking growth or compliance, and replace those incrementally while keeping everything else running.",{"_uid":5252,"title":5253,"component":5245,"description":5254},"cd6f6f6f-93f8-46c4-a7e6-73972d27a381","What affects how long it takes to fix technical debt?","How well it's documented, how much test coverage exists, and how deep it runs. Undocumented debt is the slowest to fix because engineers have to figure out what the code was supposed to do before they can change it. In health tech, compliance requirements add extra overhead, since every fix needs to be validated against HIPAA or GDPR standards.",{"_uid":5256,"title":5257,"component":5245,"description":5258},"773dd7ad-9ce6-4c14-a5a3-adcc150af88c","How does technical debt affect HIPAA compliance?","Directly. Missing audit logs, unencrypted PHI, weak access controls: these are active violations. The longer they go unfixed, the more exposure accumulates. Unlike a slow feature, you can't patch a compliance gap quietly. It usually surfaces during a hospital procurement review, an investor audit, or a breach investigation.",{"_uid":5260,"title":5261,"component":5245,"description":5262},"100a52b3-ade8-4e26-ab22-40f71a547461","Can technical debt kill a funding round?","Yes. Investors run technical due diligence specifically to find this. If your architecture can't handle 10x growth, knowledge lives with one developer, or your compliance posture has obvious gaps, it can end the conversation entirely in health tech.","HealthTech legacy FAQ","FaqSection",[5266,386,1158,5267,380],"96662c98-2d7a-4dcd-880f-48e31a675714","e718446b-70ec-4ca3-8bb4-0c86fcbab4ec",{"type":72,"content":5269},[5270],{"type":75,"attrs":5271,"content":5272},{"textAlign":19},[5273],{"text":5274,"type":80},"Technical debt in HealthTech is more than an engineering hurdle; it is a high-stakes business risk that compounds through regulatory non-compliance, security vulnerabilities, and integration bottlenecks. Unlike standard SaaS, deferred maintenance in healthcare can lead to patient safety issues, failed Series A due diligence, and multi-million dollar HIPAA penalties. By adopting a proactive framework—prioritizing debt based on compliance and revenue risks while utilizing incremental modernization strategies like the Strangler Fig pattern—founders can resolve legacy issues without sacrificing product velocity. Ultimately, managing technical debt deliberately is essential for scaling enterprise-grade software that satisfies hospital procurement standards and secures long-term growth in a highly regulated market.",[5276],{"_uid":5277,"component":521,"imageLink":5278,"imageAltText":3491,"mobileImageLink":5280,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"9962206d-156d-43cc-b125-3a952eacb413",{"id":92,"url":5279,"linktype":507,"fieldtype":95,"cached_url":5279},"https://a.storyblok.com/f/202591/2304x1576/4e5a6abd58/technical-debt-in-healthtech.png",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"technical-debt-in-healthtech","blog/technical-debt-in-healthtech",-7310,[],"b1a028c2-6c7d-478f-85ed-e3b8fb00502d","2026-04-09T13:36:20.769Z",[],[],[],{"age":5292,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":5293,"etag":5294,"per-page":5295,"referrer-policy":39,"sb-be-version":40,"server":41,"total":5296,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":5297,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":5298,"x-runtime":5299,"x-xss-protection":53},"157","Thu, 16 Apr 2026 14:21:02 GMT","W/\"8eb41feb097ba578286e41a4b4f69770\"","3","614","OQDgafXCAr78Ooa-ZpAtCg5vks0Tv_i2rDEatrMWL58w9jCGjiJyDg==","71e85cd1-ca05-4709-a14b-842956ebd174","0.180571",614,{"data":5302,"headers":5347},{"story":5303,"cv":28,"rels":5345,"links":5346},{"name":5304,"created_at":5305,"published_at":5306,"updated_at":5307,"id":5308,"uuid":5309,"content":5310,"slug":5338,"full_slug":5339,"sort_by_date":19,"position":5340,"tag_list":5341,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":5342,"first_published_at":5343,"release_id":19,"lang":26,"path":19,"alternates":5344,"default_full_slug":19,"translated_slugs":19},"Interview: How Polish Companies Enhance Israeli Technology Export","2024-02-27T14:43:56.616Z","2024-04-04T13:50:09.293Z","2024-04-04T13:50:09.329Z",451399935,"9892c3ee-1e87-48d9-a741-6cafbc410808",{"seo":5311,"_uid":5323,"title":5304,"authorId":5324,"postBody":5325,"component":5330,"categoryIds":5331,"postSummary":5332,"featuredImage":5333,"tableOfContents":5337},[5312],{"_uid":5313,"image":5314,"title":5304,"component":569,"description":5322},"30ce3d8c-8a67-4968-a444-a1f460cc9518",[5315],{"_uid":5316,"component":521,"imageLink":5317,"imageAltText":5319,"originalImageWidth":5320,"originalImageHeight":5321},"7e52e51f-2250-4c1b-8af4-745a218939b6",{"url":5318,"linktype":507,"fieldtype":95,"cached_url":5318},"https://a.storyblok.com/f/202591/1412x964/bc32037e68/katarzyna-dzidt-interview.png","katarzyna-dzidt-interview-hs","708","484","Read the article to find out why Poland is an attractive place for Israeli businesses in cybersecurity and fintech, how to enter this market and succeed. ","174ad524-f9ef-43d3-9f16-22080f2fa820","d876a579-9cff-4080-93d1-d2c98b5add5c",[5326],{"_uid":5327,"text":5328,"component":5329},"f467ae0d-43ce-45bd-9fba-7aef469ccef1","\u003Cp>Poland has been a hot spot for Israeli technology companies for quite some time now, attracting firms from the cybersecurity, homeland security, and fintech sectors. Companies of all ages and sizes, including start-ups, mature firms, and even major international behemoths, have turned to this market to find the perfect match from a plethora of Polish business partners.\u003C/p>\n\u003C!--more-->\n\u003Cp>However, entering new, foreign markets is often a troublesome endeavour. What’s the best way to approach Polish partners and how do you operate on an area five times bigger without a local expert on hand?\u003C/p>\n\u003Cp>That’s where the Economic and Trade Mission to Poland at the Israeli Embassy in Poland comes to the rescue. Thanks to its comprehensive, systemic support for businesses hailing from the Middle Eastern economic powerhouse can take full advantage of the variety of opportunities offered by Polish market.\u003C/p>\n\u003Cp class=\"important\">Today, I’m speaking with \u003Ca href=\"https://www.linkedin.com/in/katarzyna-dzidt-55016046/\" rel=\"noopener\" target=\"_blank\">Katarzyna Dzidt, Business Development Director \u003C/a>at the Embassy of Israel, whose extensive expertise covers all the ins and outs of the Polish market, the typical problems plaguing Israeli companies, and ways to help them build successful relationships. She shared with me why Poland is the go-to-market for Israeli technology, how these companies can enter the Polish market smoothly, and why Israeli entrepreneurs should pay attention to Poland.\u003C/p>\n\u003Ch2 id=\"a:Joanna-Staromiejska:-How-did-you-start-your-journey-with-the-Israeli-Embassy-in-Poland?-\">\u003Cstrong>Joanna Staromiejska: How did you start your journey with the Israeli Embassy in Poland? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>Katarzyna Dzidt:\u003C/strong> It all happened in a rather unusual way, given that it’s an embassy position—through networking and social media. Although in my previous jobs I handled PR and marketing duties, two rather crucial areas for a Business Developer Manager, the area of responsibility in this case was way different. Be that as it may, this new career path turned out to be a pretty engaging one—it’s been seven years since I joined \u003Ca href=\"https://itrade.gov.il/poland/\" rel=\"noopener\" target=\"_blank\">the Foreign Trade Administration at the Israeli Ministry of Economy and Industry\u003C/a> to support Israeli businesses.\u003C/p>\n\u003Ch2 id=\"a:JS:-What-kind-of-support-can-Israeli-businesses-get-from-you?\">\u003Cstrong>JS: What kind of support can Israeli businesses get from you?\u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> By reaching out to representatives of the Israeli Ministry of Economy in Poland, Israeli companies can get help making direct contact with a variety of Poland-based firms. That’s possible through various B2B events such as conferences, delegations, or talks. My responsibilities include helping Israeli companies establish themselves on the Polish market as smoothly as possible by providing favorable conditions for all involved parties.\u003C/p>\n\u003Cp>\u003Cstrong>The matchmaking part is crucial. The offers of Israeli firms are connected with demands and rights of the Polish partners. This is a gateway to the Polish market for Israeli companies and for Polish firms interested in collaborating with Israeli business.\u003C/strong>\u003C/p>\n\u003Ch2 id=\"a:JS:-What-does-this-matchmaking-entail?-What-problems-did-Israeli-firms-encounter?\">\u003Cstrong>JS: What does this matchmaking entail? What problems did Israeli firms encounter?\u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> \u003Cstrong>Due to the small size of the country, the Israeli market became saturated a long time ago.\u003C/strong> Currently, when a start-up is launched, its founders are usually export-minded and plan on developing their companies outside the country’s borders. Export is perceived as the primary direction of business development and a natural way of supporting the Israeli economy. It shouldn’t come as a surprise, given that the country doesn’t have much in the way of natural resources. So technology became the Israeli \u003Cem>“natural resource.”\u003C/em>\u003C/p>\n\u003Cp>Creating trade departments, such as the one in Warsaw, in countries that the Israeli government considers promising from an economic perspective, is essentially a strategic move. It guarantees space for the continued flow of exports.\u003C/p>\n\u003Cp>\u003Cstrong>The second reason is the language barrier.\u003C/strong> When Israeli firms come across a website, even a state-affiliated one, available only in Polish, the chance of making contact drops to zero. When you don’t speak Polish, doors are pretty much closed for your business. And that’s a missed chance for both parties. Local authorities on the voivodship level are allowed to decide their own budgets and expenditures and are eager to spend money on development and Israeli tech. So our matchmaking effort is supposed to connect a particular need with an appropriate solution.\u003C/p>\n\u003Ch2 id=\"a:JS:-How-has-the-Israeli-market-changed-over-the-past-seven-years?-\">\u003Cstrong>JS: How has the Israeli market changed over the past seven years? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> Israel's venture capital industry was born in the mid-1980s and has been rapidly developing since. The foundations for its current shape were laid down by the governmental VC fund Yozma in 1993. \u003Cstrong>I would say that Israeli market growth is very consistent and, frankly, unstoppable.\u003C/strong> It’s developing more or less in the same direction it has in the past, ever since Israel began steadily exporting more and more developed technologies.The only difference nowadays is that Israeli companies became more aware of how the Polish market and businesses operate which, in turn, deepened the collaboration between the two economies.\u003C/p>\n\u003Ch2 id=\"a:JS:-What-direction-is-the-Israeli-tech-ecosystem-developing-in?-\">\u003Cstrong>JS: What direction is the Israeli tech ecosystem developing in? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD: \u003C/strong>Israeli start-ups and technological companies create solutions for every area of our life—from farming, utilities, transportation, medicine, through smart cities, the energy industry (including the renewables sector), and up to homeland security and cybersecurity. Israel is seen as a world leader in the latter two industries, right next to the USA.\u003C/p>\n\u003Cp>Please note that I mentioned only the most important and popular branches of industry that Israeli tech has had an impact on—\u003Cstrong>the truth is that there is basically no area or industry for which Israeli firms haven’t developed some sort of technological breakthrough.\u003C/strong> Israel isn’t called “the Start-up Nation” for naught—with over 4,000 emerging business nationwide, the size of its tech market more or less equals Poland’s despite the country being a couple of times smaller.\u003C/p>\n\u003Ch2 id=\"a:JS:-Which-Israeli-technologies-and-companies-should-we-be-paying-attention-to?\">\u003Cstrong>JS: Which Israeli technologies and companies should we be paying attention to?\u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> In the homeland security, cybersecurity and fintech sectors, all of which fall within my area of responsibility in the department, we’ve seen countless new arrivals developing breakthrough technologies in their respective areas. The hottest companies in the HLS sector right now include \u003Ca href=\"http://www.anyvision.co/\" rel=\"noopener\" target=\"_blank\">Anyvision\u003C/a>, an advanced facial recognition technology provider, and \u003Ca href=\"https://www.sensoguard.com/\" rel=\"noopener\" target=\"_blank\">SensoGuard\u003C/a>, offering a variety of perimeter protection systems.\u003C/p>\n\u003Cp>In cybersecurity, we have companies that have already made a name for themselves in Poland, like \u003Ca href=\"https://www.checkpoint.com/\" rel=\"noopener\" target=\"_blank\">Checkpoint\u003C/a> or \u003Ca href=\"https://www.cyberark.com/\" rel=\"noopener\" target=\"_blank\">Cyberark\u003C/a>, and a couple of lesser known ones offering high-grade IT and OT network security solutions, including \u003Ca href=\"https://www.cyberbit.com/\" rel=\"noopener\" target=\"_blank\">Cyberbit\u003C/a>, \u003Ca href=\"https://www.indegy.com/\" rel=\"noopener\" target=\"_blank\">Indegy\u003C/a>, automated threat detection platform provider \u003Ca href=\"https://www.secbi.com/\" rel=\"noopener\" target=\"_blank\">SecBi \u003C/a>or \u003Ca href=\"https://www.pcysys.com/\" rel=\"noopener\" target=\"_blank\">PCYSYS\u003C/a>, offering a fully automated, self-learning penetration testing system.\u003C/p>\n\u003Cp>\u003Cstrong>The fintech sector, on the other hand, focuses primarily on companies working with machine learning, artificial intelligence, and the blockchain...\u003C/strong> Although they remain buzzwords in many international markets, they have become a reality in Israel and are used daily in many areas of its business ecosystem. You’ll be able to meet representatives from these companies at the\u003Ca href=\"https://israelhlscyber.com\" rel=\"noopener\" target=\"_blank\"> 5th HLS&amp;Cyber Conference taking place in \u003C/a>Tel Aviv in on November 12–15, 2018.&nbsp;\u003C/p>\n\u003Ch2 id=\"a:JS:-What-makes-Poland-and-Warsaw-such-an-attractive-location-for-Israeli-entrepreneurs?-\">\u003Cstrong>JS: What makes Poland and Warsaw such an attractive location for Israeli entrepreneurs? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> The size of the country and Polish market is one thing, but its image and the condition of its economy are at least equally important.\u003C/p>\n\u003Cp class=\"important\">Poland has been the only EU country to escape the ravages of the recession following the 2008 global financial crisis. We are stable and reliable partners.\u003C/p>\n\u003Cp>Besides, the Polish market is still far from saturated and remains open to trying new things and companies taking their first steps in their respective industries. Over the past couple of years, we have also observed a number of changes in the market’s approach to business and technologies.\u003C/p>\n\u003Cp>To give you a better picture—not that long ago, EU funds were spent only on developing infrastructure to support a solution. Now, the perspective shifted and a good amount of money is spent on developing the solution itself, which in turn opens doors to innovative Israeli ideas. Moreover, in some areas, Poland is more developed than Israel, creating more common ground and potential for merging ideas and technologies.\u003C/p>\n\u003Cp>\u003Cstrong>For example, Poland has Israel clearly outstripped in the financial technology services sector\u003C/strong>—from the number of people using mobile banking services, \u003Ca href=\"https://impactcee.com/2017/11/28/poland-takes-2nd-place-in-global-mobile-banking-usage-ings-financial-barometer-study-finds/\" rel=\"noopener\" target=\"_blank\">which is over ten million,\u003C/a> through modern payment and customer service systems, up to the ubiquity of contactless payment platforms. Poland has pretty much taken a quantum leap in fintech development by completely ignoring legacy payment systems, such as cheques, which both Israel and the US use extensively to this very day.\u003C/p>\n\u003Cp>\u003Cstrong>It’s become this fintech-friendly sanctuary, where you can safely take your technologies out for a spin in an innovative and open environment, and prepare them for future deployment across Western markets.\u003C/strong>\u003C/p>\n\u003Ch2 id=\"a:JS:-What-kind-of-companies-usually-reach-out-to-the-Embassy-for-support?-\">\u003Cstrong>JS: What kind of companies usually reach out to the Embassy for support? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> The breadth of applicants perfectly illustrates how diverse the Israeli economy is. On the one hand we have these big, mature companies, major international players in some cases, especially in the cybersecurity sector. On the other hand we have start-ups that Israel, true to its moniker, has lots and lots of. Generally, it’s small- and medium-size enterprises that reach out for advice and help. But the interesting fact is that the matchmaking process also includes bringing Israeli companies together with vendors, system distributors, and integrators.\u003C/p>\n\u003Cp>\u003Cimg class=\"wide\" src=\"https://a.storyblok.com/f/202591/2048x1536/7348620a25/hls-cyber.jpg\" alt=\"HLS&amp;Cyber Security Israeli Technology Day\" width=\"2048\" style=\"width: 2048px;\">\u003C/p>\n\u003Cem>\u003Cspan style=\"color: #999999;\">The example of support for Israeli companies - HLS&amp;Cyber Security Israeli Technology Day organized in Warsaw on 30th May 2018 Source:&nbsp;https://twitter.com/@MPiT_GOV_PL\u003C/span>\u003C/em>\n\u003Ch2 id=\"a:JS:-What-are-the-biggest-benefits-this-arrangement-brings-Israeli-partners?\">\u003Cstrong>JS: What are the biggest benefits this arrangement brings Israeli partners?\u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD: \u003C/strong>I’d emphasize two key benefits. The first is access to knowledge and know-how accumulated in the Polish market and its business ecosystem. The specialization of available expertise is an even more unique proposition-when we operate in a given sector, we usually know it to its very core. \u003Cstrong>Our first-hand experience and knowledge of Polish realities are simply much broader and detailed than anything an Israeli company could research and compile on their own.\u003C/strong>\u003C/p>\n\u003Cp>Besides, we facilitate access to well-developed professional networks and serve as cultural interpreter, smoothing out any kinks that may arise due to differences in both partners’ culturally-ingrained approach to business, a service which often turns out to be of invaluable help.\u003C/p>\n\u003Ch2 id=\"a:JS:-Are-there-any-Israeli-companies-that-have-already-succeeded-on-the-Polish-market?-\">\u003Cstrong>JS: Are there any Israeli companies that have already succeeded on the Polish market? \u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD:\u003C/strong> Too many of them to name here, but some names are especially worth sharing— like the Tel Aviv-based start-up \u003Ca href=\"http://www.paykey.com/\" rel=\"noopener\" target=\"_blank\">PayKey\u003C/a>, whose social banking solution has been implemented by \u003Ca href=\"https://en.ingbank.pl/\" rel=\"noopener\" target=\"_blank\">ING Bank Śląski\u003C/a> in July, 2018.\u003C/p>\n\u003Cp>It’s a smartphone keyboard that lets bank customers access financial services without having to log into a banking app. PayKey enables banks to offer their customers the ability to use a range of financial services, including P2P payments, chatbot engagement, balance checks, cardless withdrawal, and many others, within any mobile application without having to open the bank’s dedicated app. It offers a cross-platform banking button on the smartphone’s keyboard that boosts the bank’s brand engagement while making the banking experience quick, contextual, and simple for users.\u003C/p>\n\u003Cp>The “start-up,” the term being used in the Israeli sense, already employs eighteen people and \u003Ca href=\"https://www.crunchbase.com/organization/paykey#section-overview\">has \u003C/a>\u003Ca href=\"https://www.crunchbase.com/organization/paykey#section-overview\" rel=\"noopener\" target=\"_blank\">raised over $26.4M in funding since its launch in 2015.\u003C/a>\u003C/p>\n\u003Cp>\u003Cimg class=\"wide\" src=\"https://a.storyblok.com/f/202591/1600x764/e914bf941e/2i9kzvjeegmozyzqclqg3r-lcyqcbq7yfbomeannoc0edkyermk9xn7mwdsclbro06jd_jdphw6rzrxeg7dvxqm1a7o5z_i7ccby-kskxrj5il7khfanypvxlrkwtqrphxocljgo\" alt=\"PayKey Israeli fintech solution in Poland\">\u003C/p>\n\u003Cp>\u003Cspan style=\"color: #999999;\">\u003Cem>Latest success by Israeli start-up PayKey—implementation in ING Bank Śląski.&nbsp;\u003C/em>\u003C/span>\u003Cem>\u003Cem style=\"color: #999999;\">Source: www.paykey.com\u003C/em>\u003C/em>\u003C/p>\n\u003Ch2 id=\"a:JS:-What-does-the-future-of-Polish-Israeli-cooperation-look-like?\">\u003Cstrong>JS: What does the future of Polish-Israeli cooperation look like?\u003C/strong>\u003C/h2>\n\u003Cp>\u003Cstrong>KD: \u003C/strong>We’re becoming more open to Israel, but at the same time the Polish market has been seeing a steady increase in the number of homegrown solutions, too. I believe the future will revolve more around the exchange of expertise and experiences, rather than one-way sales.\u003C/p>\n\u003Cdiv class=\"blog-post__cta\" style=\"background: #fef1f1;\">\n\u003Cp class=\"blog-post__cta-heading\">Enter the Polish market smoothly\u003C/p>\n\u003Cp class=\"blog-post__cta-paragraph\">Poland is a technology sanctuary, where you can safely take your ideas out for a spin in an innovative and open environment. We'll create a common ground for merging your ideas with our expertise.\u003C/p>\n\u003Cp class=\"blog-post__cta-link\">\u003Ca href=\"/contact\" rel=\"noopener\" target=\"_blank\">Talk to our team and develop your business in Poland.\u003C/a>\u003C/p>\n\u003C/div>","textSection","Blog Post Migrated Page",[386,404,1158],"\u003Cp>Poland has been a hot spot for Israeli technology companies for quite some time now, attracting firms from the cybersecurity, homeland security, and fintech sectors. Companies of all ages and sizes, including start-ups, mature firms, and even major international behemoths, have turned to this market to find the perfect match from a plethora of Polish business partners.\u003C/p>\n",[5334],{"_uid":5335,"component":521,"imageLink":5336,"imageAltText":5319,"originalImageWidth":5320,"originalImageHeight":5321},"214200cd-4dc7-4295-b11c-6a4c73776012",{"url":5318,"linktype":507,"fieldtype":95,"cached_url":5318},"\u003Col>\u003Cli>\u003Ca href=\"#a:Joanna-Staromiejska:-How-did-you-start-your-journey-with-the-Israeli-Embassy-in-Poland?-\">Joanna Staromiejska: How did you start your journey with the Israeli Embassy in Poland? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-kind-of-support-can-Israeli-businesses-get-from-you?\">JS: What kind of support can Israeli businesses get from you?\u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-does-this-matchmaking-entail?-What-problems-did-Israeli-firms-encounter?\">JS: What does this matchmaking entail? What problems did Israeli firms encounter?\u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-How-has-the-Israeli-market-changed-over-the-past-seven-years?-\">JS: How has the Israeli market changed over the past seven years? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-direction-is-the-Israeli-tech-ecosystem-developing-in?-\">JS: What direction is the Israeli tech ecosystem developing in? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-Which-Israeli-technologies-and-companies-should-we-be-paying-attention-to?\">JS: Which Israeli technologies and companies should we be paying attention to?\u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-makes-Poland-and-Warsaw-such-an-attractive-location-for-Israeli-entrepreneurs?-\">JS: What makes Poland and Warsaw such an attractive location for Israeli entrepreneurs? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-kind-of-companies-usually-reach-out-to-the-Embassy-for-support?-\">JS: What kind of companies usually reach out to the Embassy for support? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-are-the-biggest-benefits-this-arrangement-brings-Israeli-partners?\">JS: What are the biggest benefits this arrangement brings Israeli partners?\u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-Are-there-any-Israeli-companies-that-have-already-succeeded-on-the-Polish-market?-\">JS: Are there any Israeli companies that have already succeeded on the Polish market? \u003C/a>\u003C/li>\u003Cli>\u003Ca href=\"#a:JS:-What-does-the-future-of-Polish-Israeli-cooperation-look-like?\">JS: What does the future of Polish-Israeli cooperation look like?\u003C/a>\u003C/li>\u003C/ol>","polish-israeli-relations-technology","blog/polish-israeli-relations-technology",-1810,[],"1f18e64d-cebc-40e6-b245-7f8df6595374","2018-11-06T11:49:17.000Z",[],[],[],{"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":5348,"etag":5349,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":5350,"x-amz-cf-id":5351,"x-amz-cf-pop":46,"x-cache":5352,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":5353,"x-runtime":5354,"x-xss-protection":53},"Thu, 16 Apr 2026 14:25:31 GMT","W/\"090deda4354d95d6a008f945c9d71b0b\"","1.1 e6d89c5ceb55629774766fd78f60f094.cloudfront.net (CloudFront)","qdiFTg1HX8V0NYdwgwI8kZCOxJQIbYHYuOYn1nouZXkGasTRmic3Bw==","Miss from cloudfront","b34ab393-f211-4f8d-909e-fcb57e064c53","0.030441",{"name":5356,"created_at":5357,"published_at":5358,"updated_at":5359,"id":5360,"uuid":5324,"content":5361,"slug":5383,"full_slug":5384,"sort_by_date":19,"position":5385,"tag_list":5386,"is_startpage":22,"parent_id":5387,"meta_data":19,"group_id":5388,"first_published_at":5389,"release_id":19,"lang":26,"path":19,"alternates":5390,"default_full_slug":19,"translated_slugs":19},"Joanna Staromiejska","2024-02-27T13:28:18.587Z","2025-08-04T12:09:03.710Z","2025-08-04T12:09:03.723Z",451325618,{"bio":5362,"seo":5363,"_uid":5364,"name":5365,"role":5366,"email":5367,"avatar":5368,"twitter":5376,"website":5377,"facebook":5378,"fullName":5365,"linkedin":5379,"component":5381,"hubspotId":5382,"displayName":5365},"Joanna Staromiejska-Drwięga is a content creator with over 7 years of experience in B2B tech marketing. As Content Marketing Team Lead at Monterail, she drives growth through multi-platform marketing campaigns and cross-functional collaboration. Joanna holds a degree in International Business and Management. Her work spans landing pages, ebooks, and in-depth guides, including the well-known State of Vue reports. \n",[],"e4a3919c-91aa-4e28-9195-e840c2e9ede2","Joanna Staromiejska-Drwięga","Content Marketing Team Lead",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[5369],{"_uid":5370,"component":521,"imageLink":5371,"imageAltText":5373,"originalImageWidth":5374,"originalImageHeight":5375,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"02eeab34-cbc0-4c2e-bd35-f8739ceea46e",{"url":5372,"linktype":507,"fieldtype":95,"cached_url":5372},"https://a.storyblok.com/f/202591/798x768/a805d1ff5d/joanna-staromiejska.png","Joanna Staromiejska avatar","800","998",{"id":92,"url":92,"linktype":94,"fieldtype":95,"cached_url":92},{"id":92,"url":92,"linktype":94,"fieldtype":95,"cached_url":92},{"id":92,"url":92,"linktype":94,"fieldtype":95,"cached_url":92},{"id":92,"url":5380,"linktype":94,"fieldtype":95,"cached_url":5380},"https://www.linkedin.com/in/joannastaromiejska/","Blog Author Page","5796361940","joanna-staromiejska","blog/author/joanna-staromiejska",-470,[],451289889,"f23b426f-542d-44f0-b557-6044ed1d2199","2024-02-27T13:28:18.624Z",[],1776349531149]