[{"data":1,"prerenderedAt":5813},["ShallowReactive",2],{"{}global/app-links":3,"{}global/banner":54,"{}global/navbar":119,"{}global/footer":453,"{\"filter_query\":{\"component\":{\"in\":\"Blog Post Page,Blog Post Migrated Page\"},\"authorId\":{},\"categoryIds\":{}},\"by_uuids\":\"\",\"sort_by\":\"first_published_at:desc\",\"per_page\":3,\"version\":\"published\"}":553,"{}/resources/future-of-retail":5301},{"data":4,"headers":31},{"story":5,"cv":28,"rels":29,"links":30},{"name":6,"created_at":7,"published_at":8,"updated_at":9,"id":10,"uuid":11,"content":12,"slug":17,"full_slug":18,"sort_by_date":19,"position":20,"tag_list":21,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":24,"first_published_at":25,"release_id":19,"lang":26,"path":19,"alternates":27,"default_full_slug":19,"translated_slugs":19},"app links","2023-09-11T05:31:27.452Z","2024-03-18T11:23:07.308Z","2024-03-18T11:23:07.334Z",368073957,"21b45049-0eb3-49cc-84c2-b64e6a87deaa",{"_uid":13,"component":14,"externalLinks":15,"internalLinks":16},"c61c33a3-acc2-473d-89dd-55ee67641394","appLinksList","gdpr-compliance-30-questions-to-be-answered,\nwebinar-wizualizacja-danych,\ntech-network,\nmonterail-expert-hubert-bialecki,\ndownload-ux-audit-template,\nvue-migration-cheat-sheet,\nmonterail-expert-thank-you,\ncross-platform-guide,\nvue-nuxt-migration,\nreferral-partner-program,\nvuejs-development-guide,\nen/newsletter-subscription-form,\nthank-you,\nvue-projects-by-monterail-vue-development-case-studies,\nproduct-spec,\ncommunity,\nmonteletter-subscription-confirmed,\nror-projects,\nwebinar,\nvuejs-bootcamp,\nform-tech-solution-fashion,\nsustainable-fashion-technology,\nvue-for-business-2021-report-thank-you,\nstate-of-vuejs-report-thankyou,\nsign-up-state-of-vue-2021,\nnewsletter-thankyou,\nestimate-thankyou,\ncontact-thankyou,\nyour-hr-tech-ebook,\nyour-product-spec-template","services,\ncontact,\nprojects,\nabout,\nresources,\nsoftware-development,\ncareers,\nprivacy-policy,\nprivacy-policy-for-employees-and-candidates,\nblog,\neu-program,\ncookie-declaration","app-links","global/app-links",null,40,[],false,330572742,"5a3ef0d9-1a68-4ef7-978b-c3acf7b68744","2023-09-11T09:25:03.012Z","default",[],1776349211,[],[],{"age":32,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":38,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":45,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":51,"x-runtime":52,"x-xss-protection":53},"153","max-age=0, public, s-maxage=604800, stale-if-error=3600","keep-alive","gzip","application/json; charset=utf-8","Thu, 16 Apr 2026 14:21:00 GMT","W/\"67aa43cec2568f578f3dc34c0026af59\"","strict-origin-when-cross-origin","5.747.1","nginx/1.29.1","chunked","Origin,Accept-Encoding","1.1 23e886f1dcf17062b1703f82e7f43e6e.cloudfront.net (CloudFront)","DMs5SfaBDyxJ9Ih5UkK1vJGbjwFv4CNzU5WUKQFD23qp0YUPw2E2eQ==","GRU1-P2","Hit from cloudfront","nosniff","SAMEORIGIN","none","2debc575-d742-49ae-a959-9d15d7026d51","0.028214","0",{"data":55,"headers":112},{"story":56,"cv":28,"rels":110,"links":111},{"name":57,"created_at":58,"published_at":59,"updated_at":60,"id":61,"uuid":62,"content":63,"slug":57,"full_slug":103,"sort_by_date":19,"position":104,"tag_list":105,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":106,"first_published_at":107,"release_id":19,"lang":26,"path":108,"alternates":109,"default_full_slug":19,"translated_slugs":19},"banner","2025-03-07T08:29:55.663Z","2025-10-23T12:24:19.826Z","2025-10-23T12:24:19.840Z",637001046,"4faf5a27-7862-4a60-b9c0-521bae9c30dd",{"_uid":64,"global":65,"component":102},"f085ace5-7a3f-444d-8fb2-cd964f75a4c6",[66],{"_uid":67,"text":68,"ctaLink":89,"component":100,"backgroundColor":101},"10374314-a362-4943-b1b5-bc9fb8512855",[69],{"_uid":70,"content":71,"fontSize":86,"component":87,"fontColor":88,"uppercase":22},"fd8ab370-c27f-4cf2-8be4-6135c53ab2f4",{"type":72,"content":73},"doc",[74],{"type":75,"attrs":76,"content":77},"paragraph",{"textAlign":19},[78],{"text":79,"type":80,"marks":81},"The New Default. Your hub for building smart, fast, and sustainable AI software","text",[82],{"type":83,"attrs":84},"textStyle",{"color":85},"#000000","1.8rem;2.97rem;-3%","baseText","white",[90],{"url":91,"_uid":96,"label":97,"component":98,"fontColor":88,"fontWeight":99},{"id":92,"url":93,"linktype":94,"fieldtype":95,"cached_url":93},"","http://thenewdefault.com/?utm_source=monterail&utm_medium=website&utm_campaign=TND","url","multilink","de564ec1-38ae-43b4-a732-d95e5d7ea1fd","See now","link","bold","promoBanner","vue-gradient","global","global/banner",-10,[],"3c4112d4-24c8-4129-9edf-9b8df913f668","2025-03-13T07:12:33.766Z","/",[],[],[],{"age":113,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":114,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":115,"x-amz-cf-id":116,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":117,"x-runtime":118,"x-xss-protection":53},"154","W/\"0adf1f26f785bc4654335965fd65df9a\"","1.1 284a3a41ad5cb362cfe2336c841cbbfa.cloudfront.net (CloudFront)","cKqljeCkegTt22HykkQr2BF2tJDquY4peu0rXgX6PLyN7a4wgSY4ng==","7e5a525b-da9e-4e07-8c5f-d6748e45f618","0.031114",{"data":120,"headers":448},{"story":121,"cv":28,"rels":446,"links":447},{"name":122,"created_at":123,"published_at":124,"updated_at":125,"id":126,"uuid":127,"content":128,"slug":122,"full_slug":440,"sort_by_date":19,"position":441,"tag_list":442,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":443,"first_published_at":444,"release_id":19,"lang":26,"path":108,"alternates":445,"default_full_slug":19,"translated_slugs":19},"navbar","2025-02-28T09:57:19.276Z","2026-01-21T13:23:57.702Z","2026-01-21T13:23:57.721Z",633436295,"cd451477-3966-4c58-992a-408f2659e218",{"_uid":129,"global":130,"component":102},"1991eba3-89fd-45a9-ab3d-2fc4bc11c54d",[131],{"_uid":132,"items":133,"component":439},"5aa5d8b1-c26e-4195-86dc-78c207f5479f",[134,251,340,368,432],{"_uid":135,"label":136,"navLink":137,"navList":141,"component":249,"featuredResource":250},"89f89998-d172-465b-9f35-400715b01d2d","Services",{"id":138,"url":92,"linktype":139,"fieldtype":95,"cached_url":140},"e599b429-b329-4ca0-b515-22c48c735517","story","services/",[142,165,199,215],{"_uid":143,"links":144,"title":163,"component":164},"c6caac44-728f-4cdb-90d0-75cc9d1da44c",[145,151,157],{"url":146,"_uid":149,"label":150,"component":98},{"id":147,"url":92,"linktype":139,"fieldtype":95,"cached_url":148},"993ed997-f990-4a45-98a1-748d83e3cfc5","services/web-application-development","80b1798e-906c-4a84-b349-6c2c2045100f","Web",{"url":152,"_uid":155,"label":156,"component":98},{"id":153,"url":92,"linktype":139,"fieldtype":95,"cached_url":154},"47c027fb-63cf-423f-8a68-912988fdc37c","services/mobile-development","1fc3d661-d0bd-4980-985a-cadca9527857","Mobile",{"url":158,"_uid":161,"label":162,"component":98},{"id":159,"url":92,"linktype":139,"fieldtype":95,"cached_url":160},"5aac7e1a-b6a6-40c8-9377-fab2f1eafe5b","services/artificial-intelligence-development-services","24478bc6-26fe-408d-a94b-6ddd15c4a4b4","AI solutions","SOFTWARE DEVELOPMENT","linkListWithHeader",{"_uid":166,"links":167,"title":198,"component":164},"35d94605-d1ed-41cb-aa2c-50a1b26c90f3",[168,174,180,186,192],{"url":169,"_uid":172,"label":173,"component":98},{"id":170,"url":92,"linktype":139,"fieldtype":95,"cached_url":171},"8f765b48-df5d-4976-9218-4d316a5165cb","services/vue-js-development","4786690a-e691-44cb-a207-e41003e1c53a","Vue.js",{"url":175,"_uid":178,"label":179,"component":98},{"id":176,"url":92,"linktype":139,"fieldtype":95,"cached_url":177},"b4b3c1ee-f6c8-4c3e-9e8b-6ac079bf8d00","services/ruby-on-rails-development-company","caf66a23-561f-4ac2-a33c-f37efdab8a2b","Ruby on Rails",{"url":181,"_uid":184,"label":185,"component":98},{"id":182,"url":92,"linktype":139,"fieldtype":95,"cached_url":183},"6793fcbf-1640-458e-bd70-133d307a25bc","services/flutter-development","47540b9c-9b11-4f59-bf35-ca5efda1c2b9","Flutter",{"url":187,"_uid":190,"label":191,"component":98},{"id":188,"url":92,"linktype":139,"fieldtype":95,"cached_url":189},"11f77acd-c0b2-4f4d-a49c-8ac06c33594f","services/react-native-development","72d55225-6e41-4d35-bc9f-6d3275eca84a","React Native",{"url":193,"_uid":196,"label":197,"component":98},{"id":194,"url":92,"linktype":139,"fieldtype":95,"cached_url":195},"57ffc2d4-e976-4b7f-885f-646e7ce87d1f","services/nodejs-development","d5dac158-501f-4f88-b58a-11363d49c628","Node.js","TECHNOLOGIES",{"_uid":200,"links":201,"title":214,"component":164},"648b8696-b270-41ba-b2d2-cfbefcfdf4c2",[202,208],{"url":203,"_uid":206,"label":207,"component":98},{"id":204,"url":92,"linktype":139,"fieldtype":95,"cached_url":205},"34366041-c090-4ab2-8bec-52bc75f648a6","services/product-design","9280f0c2-2660-4780-8e53-26e46f086d2b","Product design",{"url":209,"_uid":212,"label":213,"component":98},{"id":210,"url":92,"linktype":139,"fieldtype":95,"cached_url":211},"396e832f-e133-4852-b4bf-ad166f2c65b5","services/mvp-development","9b08f813-c6e8-4593-9edc-7e4b906f53a7","MVP Development","PRODUCT",{"_uid":216,"links":217,"title":248,"component":164},"61ed8268-92e8-4dd9-b93c-ec92c2d64286",[218,224,230,236,242],{"url":219,"_uid":222,"label":223,"component":98,"fontColor":92,"fontWeight":92},{"id":220,"url":92,"linktype":139,"fieldtype":95,"cached_url":221},"fb749ebf-5449-42b2-a9f8-a69c877654b2","services/healthcare-software-development","1d337f38-5a19-47a5-b30f-d15a4f3f61a1","HealthTech",{"url":225,"_uid":228,"label":229,"component":98},{"id":226,"url":92,"linktype":139,"fieldtype":95,"cached_url":227},"2ad5217e-ce66-4856-ab1b-a86a62cb6d63","services/fintech-software-development","80368e15-bc88-44a2-ac90-29a7246a2d3a","FinTech",{"url":231,"_uid":234,"label":235,"component":98},{"id":232,"url":92,"linktype":139,"fieldtype":95,"cached_url":233},"4b26f380-4829-44b6-a7d9-e7d2f25a817e","services/hr-tech-software-development","6db2b6a2-d213-4bb6-a5e1-88c35ed96f49","HRTech",{"url":237,"_uid":240,"label":241,"component":98},{"id":238,"url":92,"linktype":139,"fieldtype":95,"cached_url":239},"3d311168-908e-4e19-8836-8de42a991d25","services/retail-software-development","64b1abe6-b413-4dcb-9966-cf1edafa2e7f","Retail",{"url":243,"_uid":246,"label":247,"component":98},{"id":244,"url":92,"linktype":139,"fieldtype":95,"cached_url":245},"7becc096-d69d-4e0f-9f91-ad402f7929b0","services/real-estate-proptech-software-development","4615d54d-cd73-46b5-9140-c16cb3824a61","PropTech","INDUSTRY","navItem",[],{"_uid":252,"label":253,"navLink":254,"navList":257,"component":249},"7d2804ab-1611-4268-a5a0-5900f76d18fc","Clients",{"id":255,"url":92,"linktype":139,"fieldtype":95,"cached_url":256},"a0d8fc07-5d1c-43da-89e7-8899d0e63943","projects/",[258,274,296,318],{"_uid":259,"links":260,"title":273,"component":164},"41c0badc-fdda-4977-9a56-5a3ec6d43bfe",[261,267],{"url":262,"_uid":265,"label":266,"component":98},{"id":263,"url":92,"linktype":139,"fieldtype":95,"cached_url":264},"0f534228-99e9-4f1e-802d-398f3e863d6e","projects/pizza-hut","f1918385-8add-487d-8576-413df909affa","Pizza Hut",{"url":268,"_uid":271,"label":272,"component":98},{"id":269,"url":92,"linktype":139,"fieldtype":95,"cached_url":270},"adf03e4a-0523-421b-aded-6f1111c11e74","projects/merck-unite","0dd008dd-86a7-4f3b-a7d4-f7f9a61996f7","Merck","ENTERPRISES",{"_uid":275,"links":276,"title":295,"component":164},"658c3334-36ed-4e58-bfed-6ecd7dd9544d",[277,283,289],{"url":278,"_uid":281,"label":282,"component":98},{"id":279,"url":92,"linktype":139,"fieldtype":95,"cached_url":280},"f9f14dc8-9581-42ee-9bb3-9c25a68201ac","projects/cooleaf","0951912e-d5be-40e7-bdf8-b26a6814eb5e","Cooleaf",{"url":284,"_uid":287,"label":288,"component":98},{"id":285,"url":92,"linktype":139,"fieldtype":95,"cached_url":286},"2fbe08b9-a493-4ab4-9667-709388b2d18f","projects/flink","df78aa7b-01e9-42f3-8eb4-20ceb4f504ef","Flink",{"url":290,"_uid":293,"label":294,"component":98},{"id":291,"url":92,"linktype":139,"fieldtype":95,"cached_url":292},"1ebc1646-3a9d-4896-9d12-e258c69da449","projects/seat-unique","0eb745da-f28b-408c-8308-40e20896bc38","Seat Unique","SCALE-UPS",{"_uid":297,"links":298,"title":317,"component":164},"94af7d94-9c6e-48af-a272-a23cdd30569a",[299,305,311],{"url":300,"_uid":303,"label":304,"component":98},{"id":301,"url":92,"linktype":139,"fieldtype":95,"cached_url":302},"88d45a5e-4091-4db3-b41e-23bf04d5a990","projects/careerfit","5d4cc6aa-9867-463f-a951-06dc8581e956","CareerFit",{"url":306,"_uid":309,"label":310,"component":98},{"id":307,"url":92,"linktype":139,"fieldtype":95,"cached_url":308},"000bd399-91e0-47b4-acd8-d06aafd80515","projects/equinet","4aae5ffb-827d-4633-b8d9-1cfa359baff5","Equinet",{"url":312,"_uid":315,"label":316,"component":98},{"id":313,"url":92,"linktype":139,"fieldtype":95,"cached_url":314},"81da6efd-521d-4338-aeda-584c8822ef88","projects/systems-engineering","b16a223b-e3d0-4670-bb46-51ee12a10f2d","Systems Engineering","SMEs",{"_uid":319,"links":320,"title":339,"component":164},"20883f09-e33b-4abe-beeb-ca7cc27e7a0f",[321,327,333],{"url":322,"_uid":325,"label":326,"component":98},{"id":323,"url":92,"linktype":139,"fieldtype":95,"cached_url":324},"fd4726f1-0df4-467a-acb2-d0d0d77a4e0c","projects/flexxa","8087e964-7b57-4eb8-89ad-022595765faf","Flexxa",{"url":328,"_uid":331,"label":332,"component":98},{"id":329,"url":92,"linktype":139,"fieldtype":95,"cached_url":330},"5fd12c86-2dac-4808-8301-7c9d4c60d750","projects/octoberhealth","b124bc10-10cf-4974-bb88-8242840fb481","October Health",{"url":334,"_uid":337,"label":338,"component":98},{"id":335,"url":92,"linktype":139,"fieldtype":95,"cached_url":336},"6d61aa20-5f49-4447-bb0b-cb7334609cef","projects/sprii-case-study","833475f4-d80c-46ce-bf0b-0b7f4d2760c6","Sprii","START-UPS",{"_uid":341,"label":342,"navLink":343,"navList":346,"component":249,"featuredResource":367},"ee52511f-51db-48ec-b027-36e32baf853d","About us",{"id":344,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"967c895c-f374-4364-b7e1-e3caaa0fdc6b","about/",[347],{"_uid":348,"links":349,"title":92,"component":164},"dbb1c16c-d340-411e-9891-dcb84671dc8f",[350,355,361],{"url":351,"_uid":353,"label":354,"component":98},{"id":352,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"61ac58fa-1680-48cb-a2f2-63ce1c0fb014","2f91d2ee-f008-4cb3-8d3a-54f90b1e248d","Meet the team",{"url":356,"_uid":359,"label":360,"component":98},{"id":357,"url":92,"linktype":139,"fieldtype":95,"cached_url":358},"3651d250-624a-4de8-91ef-c587a5201f27","about/our-workflow","5ed0dcc2-af78-4850-a37c-43519c317d3a","Our workflow",{"url":362,"_uid":365,"label":366,"component":98},{"id":363,"url":92,"linktype":139,"fieldtype":95,"cached_url":364},"2c24df34-f6c7-45b4-bd0b-4d18825a8b73","about/diversity-and-inclusion","d8e98672-48f6-4c25-a41b-fe1e1f45225e","Diversity & inclusion",[],{"_uid":369,"label":370,"navLink":371,"navList":374,"component":249,"featuredResource":431},"a3c1ed45-b860-45f4-9cb4-a38e704df310","Insights",{"id":372,"url":92,"linktype":139,"fieldtype":95,"cached_url":373},"02b9214b-7bcc-4ca0-8043-834fb9253dfd","blog/",[375,409],{"_uid":376,"links":377,"title":408,"component":164},"78a6a878-4cfb-4164-989a-634b7c1f152e",[378,384,390,396,402],{"url":379,"_uid":382,"label":383,"component":98},{"id":380,"url":92,"linktype":139,"fieldtype":95,"cached_url":381},"454ddbdc-fc56-4ec3-a378-7ff7673c4c36","blog/topic/technology","1268be04-37df-4989-bf58-45df1811523b","Technology",{"url":385,"_uid":388,"label":389,"component":98},{"id":386,"url":92,"linktype":139,"fieldtype":95,"cached_url":387},"261330d3-0c84-4ffe-ac5b-14c150ef4d1c","blog/topic/business","428ce967-1483-4385-b728-14899f167505","Business",{"url":391,"_uid":394,"label":395,"component":98},{"id":392,"url":92,"linktype":139,"fieldtype":95,"cached_url":393},"60775fb9-433a-4ce9-bf32-14681a06aa9c","blog/topic/product-design","82f2c109-e41d-49af-a419-0fdd240e6bad","Product Design",{"url":397,"_uid":400,"label":401,"component":98},{"id":398,"url":92,"linktype":139,"fieldtype":95,"cached_url":399},"86c6dbac-ac2d-4c27-9a02-5e6bf6e52ad6","blog/topic/ai","6cbd224a-2c6b-4541-8d0b-3969f89f391c","AI",{"url":403,"_uid":406,"label":407,"component":98},{"id":404,"url":92,"linktype":139,"fieldtype":95,"cached_url":405},"d8b135db-127b-4ebb-84d0-db5585b90977","blog/topic/culture","f82bdf78-ea22-4935-a8a3-9bc56a4d487e","Culture","CATEGORIES",{"_uid":410,"links":411,"title":430,"component":164},"a38f984d-7218-4208-9714-e246f26fdf68",[412,418,424],{"url":413,"_uid":416,"label":417,"component":98},{"id":414,"url":92,"linktype":139,"fieldtype":95,"cached_url":415},"ad5b4644-8799-4e66-848f-9fece29af834","vue-js-resource-library","3201165e-9422-4db5-936a-eff87fd63055","Vue.js Resource Library",{"url":419,"_uid":422,"label":423,"component":98},{"id":420,"url":92,"linktype":139,"fieldtype":95,"cached_url":421},"a140f746-26d5-4b3d-99b1-b402bf24bb9c","services/vue-js-technology-guide","e0bd2e62-5fb5-40ac-a76c-6b3e1e6b2d9a","Vue.js Technology Guide",{"url":425,"_uid":428,"label":429,"component":98,"fontColor":92,"fontWeight":92},{"id":426,"url":92,"linktype":139,"fieldtype":95,"cached_url":427},"491e2745-d534-4eeb-ac0c-773d24ca9008","vue3-migration-guide","ec037c43-aa9e-4f7c-9dd2-8a6a5eaa763a","Vue 3 Migration Guide ","Resources",[],{"_uid":433,"label":434,"navLink":435,"navList":438,"component":249},"972bcc26-a41a-46fe-8efb-b7dfe82e2774","Careers",{"id":436,"url":92,"linktype":139,"fieldtype":95,"cached_url":437},"8f0dc7af-f9c1-44a9-a80d-89372f8cc267","careers/",[],"newNavbar","global/navbar",20,[],"a147aa3d-ca9d-4fd9-9935-7f273bd01f6c","2025-02-28T09:58:21.611Z",[],[],[],{"age":113,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":37,"etag":449,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":450,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":451,"x-runtime":452,"x-xss-protection":53},"W/\"5b1d5e7618ca9db1a4c33167033955b6\"","a4nvlpiBY4eapQWFpzj7xBTZmPiKj8hvq7IGbLHq2RIYM3WxHPtSyg==","c528bd92-d59a-4e21-ab8b-473bdbb603b5","0.031030",{"data":454,"headers":545},{"story":455,"cv":28,"rels":543,"links":544},{"name":456,"created_at":457,"published_at":458,"updated_at":459,"id":460,"uuid":461,"content":462,"slug":456,"full_slug":537,"sort_by_date":19,"position":538,"tag_list":539,"is_startpage":22,"parent_id":23,"meta_data":19,"group_id":540,"first_published_at":541,"release_id":19,"lang":26,"path":19,"alternates":542,"default_full_slug":19,"translated_slugs":19},"footer","2023-06-26T06:24:36.783Z","2025-04-04T10:23:27.121Z","2025-04-04T10:23:27.142Z",330572753,"4f7468eb-eab1-4b19-9888-91e9ec9a531c",{"_uid":463,"global":464,"component":102},"a1d00131-5209-43cd-8903-741b7c46d716",[465],{"_uid":466,"other":467,"component":456,"footerLinks":480,"recognitionSectionItem":498,"recognitionSectionTitle":536},"e295beac-37a2-4ff1-92ac-53c9cffc1aa7",[468,474],{"url":469,"_uid":472,"label":473,"component":98},{"id":470,"url":92,"linktype":139,"fieldtype":95,"cached_url":471},"f6d15ccb-fd0d-417c-a140-5d1615b3e032","privacy-policy","556a1806-0dce-4fef-ba6c-f0c6ae3ac7cf","Privacy policy",{"url":475,"_uid":478,"label":479,"component":98},{"id":476,"url":92,"linktype":139,"fieldtype":95,"cached_url":477},"119dd9b7-f275-4ffc-8e88-0382984a7e42","whistleblower-policy","e5174f5f-9e3f-4845-83b3-b2da9f6b7eb0","Whistleblower policy",[481,484,487,490,495],{"url":482,"_uid":483,"label":136,"component":98},{"id":138,"url":92,"linktype":139,"fieldtype":95,"cached_url":140},"37e6c270-9411-4403-b002-a2d11075de2f",{"url":485,"_uid":486,"label":253,"component":98},{"id":255,"url":92,"linktype":139,"fieldtype":95,"cached_url":256},"7d276faf-cd53-4566-8d3a-b88c07c112bc",{"url":488,"_uid":489,"label":342,"component":98},{"id":344,"url":92,"linktype":139,"fieldtype":95,"cached_url":345},"5881f50b-8789-47a5-a6c2-d4168c1c8272",{"url":491,"_uid":493,"label":494,"component":98},{"id":492,"url":92,"linktype":139,"fieldtype":95,"cached_url":373},"be5b4cc1-eeeb-4b80-8667-d5349d25caa5","ab462dd1-fc56-4b64-a408-626cedc1b075","Blog",{"url":496,"_uid":497,"label":434,"component":98},{"id":436,"url":92,"linktype":139,"fieldtype":95,"cached_url":437},"3c0be0e8-510d-4b8f-9142-27d1dc11812e",[499,510,519,528],{"_uid":500,"CTALink":501,"component":504,"imageLink":505,"imageAltText":508,"originalImageWidth":509,"originalImageHeight":509},"82efaec0-a246-40cd-bd36-4a9f7de3914b",{"id":92,"url":502,"target":503,"linktype":94,"fieldtype":95,"cached_url":502},"https://clutch.co/profile/monterail#reviews","_blank","imageWithLink",{"id":92,"url":506,"linktype":507,"fieldtype":95,"cached_url":506},"https://a.storyblok.com/f/202591/171x49/1c18b37fd6/clutch.svg","asset","Clutch recognised Monterail","173",{"_uid":511,"CTALink":512,"component":504,"imageLink":514,"imageAltText":516,"originalImageWidth":517,"originalImageHeight":518},"e6103c4a-9996-4a28-b050-2b370ae991d0",{"id":92,"url":513,"target":503,"linktype":94,"fieldtype":95,"cached_url":513},"https://vuejs.org/partners/monterail.html",{"id":92,"url":515,"linktype":507,"fieldtype":95,"cached_url":515},"https://a.storyblok.com/f/202591/170x49/db158a26a5/vue-partner.svg","Official Vue Partner","170","49",{"_uid":520,"component":521,"imageLink":522,"imageTitle":524,"imageAltText":525,"originalImageWidth":526,"originalImageHeight":527,"originalMobileImageHeight":92},"071db734-a4c1-42c4-90e8-354c487ae4d3","externalImage",{"id":92,"url":523,"linktype":507,"fieldtype":95,"cached_url":523},"https://a.storyblok.com/f/202591/99x41/e9940cc436/financial-times.svg","Financial times badge","Financial Times recognised Monterail","99","41",{"_uid":529,"component":521,"imageLink":530,"imageTitle":532,"imageAltText":533,"originalImageWidth":534,"originalImageHeight":535,"originalMobileImageHeight":92},"a7ad96fd-04c5-41ee-8edd-bb6c9e2661c4",{"id":92,"url":531,"linktype":507,"fieldtype":95,"cached_url":531},"https://a.storyblok.com/f/202591/151x29/5e4215bdb3/deloitte.svg","Deloitte badge","Deloite recognised Monterail","151","29","Recognized by","global/footer",10,[],"c7b5e344-a5c0-423a-bf5f-4c4b389396d8","2023-07-18T06:12:53.356Z",[],[],[],{"age":546,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":547,"etag":548,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":549,"x-amz-cf-id":550,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":551,"x-runtime":552,"x-xss-protection":53},"158","Thu, 16 Apr 2026 14:21:01 GMT","W/\"9de5e3273276afa3f6e7680d288d3e9f\"","1.1 e8fc5ca8beb1980902ed927d11fa6d7e.cloudfront.net (CloudFront)","ufqIjVTixlOJJKNvWj0daPYUXS7yKlYEhVaUqW2p4v4yqJKFj9hZnA==","91d02977-8fd8-4a74-bf42-1bb7b2c585b6","0.021466",{"data":554,"headers":5291,"perPage":633,"total":5300},{"stories":555,"cv":28,"rels":5289,"links":5290},[556,1198,3490],{"name":557,"created_at":558,"published_at":559,"updated_at":560,"id":561,"uuid":562,"content":563,"slug":1191,"full_slug":1192,"sort_by_date":19,"position":1193,"tag_list":1194,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":1196,"first_published_at":559,"release_id":19,"lang":26,"path":19,"alternates":1197,"default_full_slug":19,"translated_slugs":19},"Who’s Defining the New Default: Speakers’ Highlights (Part V)","2026-04-16T13:28:02.255Z","2026-04-16T13:47:47.680Z","2026-04-16T13:47:47.713Z",166528951353009,"1b10e00e-6b5e-42eb-aa22-f3e8bbd74473",{"seo":564,"_uid":571,"title":557,"Subtitle":572,"authorId":573,"postBody":574,"component":1156,"categoryIds":1157,"postSummary":1159,"featuredImage":1184,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":1190},[565],{"_uid":566,"image":567,"title":568,"noIndex":22,"component":569,"description":570,"canonicalUrl":92},"d0ad0de9-53ae-4509-89b4-5cccea1f196a",[],"Who’s Defining the New Default: Speakers’ Highlights (Part V) | Monterail blog ","seo","Explore how AI security, embodied hardware, and open-source economics define the \"New Default.\" Learn from experts redefining AI infrastructure and sovereignty.","65c3609e-76f6-4022-99a3-3a5cd57e9579",[],"da37d717-1957-47a3-827f-98feafa51262",[575],{"_uid":576,"content":577,"component":1155},"64f65237-8aad-4419-af4c-43c161eaef69",{"type":72,"content":578},[579,589,597,605,620,622,712,714,728,737,745,747,755,774,835,837,841,844,847,850,864,875,883,891,941,943,946,948,951,954,957,960,963,976,986,994,1002,1052,1054,1067,1069,1079,1087,1106,1114,1148],{"type":580,"attrs":581,"content":583},"heading",{"level":582,"textAlign":19},2,[584],{"text":585,"type":80,"marks":586},"From Wrappers to World-Models: How to Build a Physical and Secure Infrastructure for AI?",[587],{"type":83,"attrs":588},{"color":85},{"type":75,"attrs":590,"content":591},{"textAlign":19},[592],{"text":593,"type":80,"marks":594},"The architecture of the AI era is being built on three pillars: security-first engineering, embodied intelligence, and the geopolitical economics of open source. In this article we explore how practitioners we talked to, are moving beyond \"wrapper\" apps toward resilient, sovereign, and physically integrated AI systems.",[595],{"type":83,"attrs":596},{"color":85},{"type":75,"attrs":598,"content":599},{"textAlign":19},[600],{"text":601,"type":80,"marks":602},"What happens when AI moves from a chatbot window into the browser, into our glasses, and into the foundations of national policy? As the novelty of LLMs fades, the focus has shifted to the \"boring\" but critical work of making these systems safe, sustainable, and physically useful.",[603],{"type":83,"attrs":604},{"color":85},{"type":75,"attrs":606,"content":607},{"textAlign":19},[608,615],{"text":609,"type":80,"marks":610},"The New Default",[611,613],{"type":83,"attrs":612},{"color":85},{"type":614},"italic",{"text":616,"type":80,"marks":617}," speaker series examines the infrastructure required to support a world where AI agents act on our behalf, and hardware finally catches up to software's intelligence.",[618],{"type":83,"attrs":619},{"color":85},{"type":75,"attrs":621},{"textAlign":19},{"type":623,"attrs":624},"blok",{"id":625,"body":626},"aafb9f04-4e3a-4752-9cbd-51fcc8407b65",[627],{"_uid":628,"quote":629,"fontSize":709,"component":710,"accentColor":711},"i-66a34f9e-9d68-4066-8acd-f8a845d7214a",{"type":72,"content":630},[631,641],{"type":580,"attrs":632,"content":634},{"level":633,"textAlign":19},3,[635],{"text":636,"type":80,"marks":637},"Key Takeaways:",[638,640],{"type":83,"attrs":639},{"color":85},{"type":99},{"type":642,"content":643},"bullet_list",[644,661,677,693],{"type":645,"content":646},"list_item",[647],{"type":75,"attrs":648,"content":649},{"textAlign":19},[650,656],{"text":651,"type":80,"marks":652},"Security is the new feature.",[653,655],{"type":83,"attrs":654},{"color":85},{"type":99},{"text":657,"type":80,"marks":658}," AI agents operating in browsers introduce \"agentic attack\" surfaces that require defensive guardrails and rigorous testing frameworks like Spikee.",[659],{"type":83,"attrs":660},{"color":85},{"type":645,"content":662},[663],{"type":75,"attrs":664,"content":665},{"textAlign":19},[666,672],{"text":667,"type":80,"marks":668},"Embodiment over Immersion.",[669,671],{"type":83,"attrs":670},{"color":85},{"type":99},{"text":673,"type":80,"marks":674}," The future of AI hardware lies in \"AI glasses\" that augment reality through audio and context, rather than VR headsets that replace it.",[675],{"type":83,"attrs":676},{"color":85},{"type":645,"content":678},[679],{"type":75,"attrs":680,"content":681},{"textAlign":19},[682,688],{"text":683,"type":80,"marks":684},"Open Source is a Spectrum.",[685,687],{"type":83,"attrs":686},{"color":85},{"type":99},{"text":689,"type":80,"marks":690}," Open-source AI is rarely a purely altruistic act; it is often a strategic \"national bet\" or a way to commoditize complements.",[691],{"type":83,"attrs":692},{"color":85},{"type":645,"content":694},[695],{"type":75,"attrs":696,"content":697},{"textAlign":19},[698,704],{"text":699,"type":80,"marks":700},"Data Sovereignty is National Security.",[701,703],{"type":83,"attrs":702},{"color":85},{"type":99},{"text":705,"type":80,"marks":706}," AI sovereignty is becoming a core component of digital policy, moving from corporate competition to national interest.",[707],{"type":83,"attrs":708},{"color":85},"text-24 md:text-26","quoteBlock","purple",{"type":580,"attrs":713},{"level":633,"textAlign":19},{"type":75,"attrs":715,"content":716},{"textAlign":19},[717],{"type":718,"attrs":719,"marks":723},"image",{"id":720,"alt":92,"src":721,"title":92,"source":92,"copyright":92,"meta_data":722},21599167,"https://a.storyblok.com/f/202591/1200x694/ad054351ad/ai-software-development.png",{},[724],{"type":98,"attrs":725},{"href":726,"uuid":19,"anchor":19,"target":727,"linktype":94},"https://www.monterail.com/services/artificial-intelligence-development-services","_self",{"type":580,"attrs":729,"content":730},{"level":582,"textAlign":19},[731],{"text":732,"type":80,"marks":733},"Beyond the Hype: How Security, Hardware, and Geopolitics are Shaping the Next Era of AI",[734,736],{"type":83,"attrs":735},{"color":85},{"type":99},{"type":75,"attrs":738,"content":739},{"textAlign":19},[740],{"text":741,"type":80,"marks":742},"The New Default is about the structural integrity of the systems that host the chatbots. As we move away from simple API wrappers and toward deep integration, the conversation has shifted toward the heavy lifting of engineering. We sat down with three experts who are redefining these boundaries: exploring how to secure autonomous agents that navigate the web, how to move AI out of the screen and into wearable hardware, and how the \"national bet\" on open-source models is reshaping global digital sovereignty.",[743],{"type":83,"attrs":744},{"color":85},{"type":75,"attrs":746},{"textAlign":19},{"type":580,"attrs":748,"content":749},{"level":582,"textAlign":19},[750],{"text":751,"type":80,"marks":752},"Donato Capitella: The Security Architect of Agentic AI",[753],{"type":83,"attrs":754},{"color":85},{"type":75,"attrs":756,"content":757},{"textAlign":19},[758,763,769],{"text":759,"type":80,"marks":760},"Donato Capitella, a leading voice in AI security, focuses on the \"agentic\" shift, where AI doesn't just talk, but ",[761],{"type":83,"attrs":762},{"color":85},{"text":764,"type":80,"marks":765},"acts",[766,768],{"type":83,"attrs":767},{"color":85},{"type":614},{"text":770,"type":80,"marks":771},". As we give LLMs the power to browse the web and execute code, we open a Pandora's box of browser-based vulnerabilities. Here are the areas Donato expanded in our talks: ",[772],{"type":83,"attrs":773},{"color":85},{"type":642,"content":775},[776,792,808],{"type":645,"content":777},[778],{"type":75,"attrs":779,"content":780},{"textAlign":19},[781,787],{"text":782,"type":80,"marks":783},"LLM Guardrails as Infrastructure:",[784,786],{"type":83,"attrs":785},{"color":85},{"type":99},{"text":788,"type":80,"marks":789}," Donato argues that guardrails shouldn't be an afterthought. They are the essential filtering layer that prevents prompt injection and ensures model outputs remain within safe operational bounds.",[790],{"type":83,"attrs":791},{"color":85},{"type":645,"content":793},[794],{"type":75,"attrs":795,"content":796},{"textAlign":19},[797,803],{"text":798,"type":80,"marks":799},"The Browser-Based Agentic Attack:",[800,802],{"type":83,"attrs":801},{"color":85},{"type":99},{"text":804,"type":80,"marks":805}," He warns of a new class of threats where AI agents can be manipulated by the very websites they browse. An agent tasked with \"summarizing a page\" might be tricked by hidden text into \"deleting the user's account,\" requiring a fundamental rethink of web security.",[806],{"type":83,"attrs":807},{"color":85},{"type":645,"content":809},[810],{"type":75,"attrs":811,"content":812},{"textAlign":19},[813,819,824,830],{"text":814,"type":80,"marks":815},"Spikee: Testing for Non-Determinism:",[816,818],{"type":83,"attrs":817},{"color":85},{"type":99},{"text":820,"type":80,"marks":821}," To solve this, Donato introduces ",[822],{"type":83,"attrs":823},{"color":85},{"text":825,"type":80,"marks":826},"Spikee",[827,829],{"type":83,"attrs":828},{"color":85},{"type":99},{"text":831,"type":80,"marks":832},", a testing framework designed specifically for the unpredictable nature of LLMs, allowing developers to stress-test agentic workflows before they hit production.",[833],{"type":83,"attrs":834},{"color":85},{"type":75,"attrs":836},{"textAlign":19},{"type":623,"attrs":838},{"id":839,"body":840},"e6d2c75f-e4bd-4688-b739-7d088e28afee",[],{"type":623,"attrs":842},{"id":839,"body":843},[],{"type":623,"attrs":845},{"id":839,"body":846},[],{"type":623,"attrs":848},{"id":839,"body":849},[],{"type":623,"attrs":851},{"id":625,"body":852},[853],{"_uid":854,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":856,"placeholderText":92,"placeholderImage":857},"i-e48320dc-1f65-414f-9288-f6a049ca4168","embededVideoSection","https://www.youtube.com/embed/6mixCpOp3YI?si=HIgBX4wpHtIuqBiJ",[858],{"_uid":859,"component":521,"imageLink":860,"imageAltText":862,"mobileImageLink":863,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"ede1074c-e6e0-4f28-a2ce-48cc84743777",{"id":92,"url":861,"linktype":507,"fieldtype":95,"cached_url":861},"https://a.storyblok.com/f/202591/1280x720/62f326ddbc/llm-applications-guardrails-donato.png","llm applications guardrails",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":865,"content":866},"blockquote",[867],{"type":75,"attrs":868,"content":869},{"textAlign":19},[870],{"text":871,"type":80,"marks":872},"\"The output of the LLM is untrusted input into your system. You need to treat the output of any LLM as if it came from an untrusted source.\" ",[873],{"type":83,"attrs":874},{"color":85},{"type":580,"attrs":876,"content":877},{"level":582,"textAlign":19},[878],{"text":879,"type":80,"marks":880},"Bobak Tavangar: Hardware, Software, and the Vision of Embodied AI",[881],{"type":83,"attrs":882},{"color":85},{"type":75,"attrs":884,"content":885},{"textAlign":19},[886],{"text":887,"type":80,"marks":888},"Bobak Tavangar, Co-founder and CEO of Brilliant Labs, brings a contrarian perspective to the \"AI in a box\" trend. His vision centers on how AI can finally bridge the gap between digital intelligence and physical experience. Here’s what you can lear from Bobak:",[889],{"type":83,"attrs":890},{"color":85},{"type":642,"content":892},[893,909,925],{"type":645,"content":894},[895],{"type":75,"attrs":896,"content":897},{"textAlign":19},[898,904],{"text":899,"type":80,"marks":900},"AI Glasses vs. VR:",[901,903],{"type":83,"attrs":902},{"color":85},{"type":99},{"text":905,"type":80,"marks":906}," While the tech world chases high-fidelity VR graphics, Bobak makes the case for AI glasses. His argument? We don't need to be transported to another world; we need our current world to be smarter. AI glasses provide a \"heads-up\" interface where intelligence is felt through context and audio rather than just pixels.",[907],{"type":83,"attrs":908},{"color":85},{"type":645,"content":910},[911],{"type":75,"attrs":912,"content":913},{"textAlign":19},[914,920],{"text":915,"type":80,"marks":916},"Embodiment and Technical Architecture:",[917,919],{"type":83,"attrs":918},{"color":85},{"type":99},{"text":921,"type":80,"marks":922}," Bobak highlights that true AI embodiment requires a tight loop between hardware and software. The \"New Default\" for hardware is a system that isn't just a peripheral but a sensory extension of the AI model itself.",[923],{"type":83,"attrs":924},{"color":85},{"type":645,"content":926},[927],{"type":75,"attrs":928,"content":929},{"textAlign":19},[930,936],{"text":931,"type":80,"marks":932},"Community-Driven Hardware:",[933,935],{"type":83,"attrs":934},{"color":85},{"type":99},{"text":937,"type":80,"marks":938}," He emphasizes that the most resilient technical architectures are those built in collaboration with developer communities, advocating for open-source hardware that allows for rapid iteration and \"embodied\" experimentation.",[939],{"type":83,"attrs":940},{"color":85},{"type":75,"attrs":942},{"textAlign":19},{"type":623,"attrs":944},{"id":839,"body":945},[],{"type":75,"attrs":947},{"textAlign":19},{"type":623,"attrs":949},{"id":839,"body":950},[],{"type":623,"attrs":952},{"id":839,"body":953},[],{"type":623,"attrs":955},{"id":839,"body":956},[],{"type":623,"attrs":958},{"id":839,"body":959},[],{"type":623,"attrs":961},{"id":839,"body":962},[],{"type":623,"attrs":964},{"id":625,"body":965},[966],{"_uid":967,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":968,"placeholderText":92,"placeholderImage":969},"i-90610cc7-8560-4516-a25b-2a8369ade72d","https://www.youtube.com/embed/P4qu2gvrMi4?si=tTRcpZem2notgnQn",[970],{"_uid":971,"component":521,"imageLink":972,"imageAltText":974,"mobileImageLink":975,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"c2db670f-9d49-4a74-8c9a-1ad3a258de1c",{"id":92,"url":973,"linktype":507,"fieldtype":95,"cached_url":973},"https://a.storyblok.com/f/202591/1280x720/a25c36fb8b/bobak-ai-glasses.png","AI Glasses not vr graphics",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":865,"content":977},[978],{"type":75,"attrs":979,"content":980},{"textAlign":19},[981],{"text":982,"type":80,"marks":983},"The glasses don't render new worlds. They try to understand the one you are actually in... it's sort of the best form factor for giving an AI agent a front row seat to that life.",[984],{"type":83,"attrs":985},{"color":85},{"type":580,"attrs":987,"content":988},{"level":582,"textAlign":19},[989],{"text":990,"type":80,"marks":991},"Elizabeth Seger: The Geopolitics and Economics of Open AI",[992],{"type":83,"attrs":993},{"color":85},{"type":75,"attrs":995,"content":996},{"textAlign":19},[997],{"text":998,"type":80,"marks":999},"Elizabeth Seger, a specialist in AI ethics and digital policy, shifts the lens toward the macro-scale. She explores why \"open source\" has become the primary battleground for AI dominance. Here are Elisabeth’s insights on the safety and economics of Open AI:",[1000],{"type":83,"attrs":1001},{"color":85},{"type":642,"content":1003},[1004,1020,1036],{"type":645,"content":1005},[1006],{"type":75,"attrs":1007,"content":1008},{"textAlign":19},[1009,1015],{"text":1010,"type":80,"marks":1011},"The Economics of \"Free\":",[1012,1014],{"type":83,"attrs":1013},{"color":85},{"type":99},{"text":1016,"type":80,"marks":1017}," Elizabeth demystifies the open-source movement, noting that companies often open-source models to commoditize complementary products (like compute or cloud services). It is a strategic play to set the industry standard and prevent vendor lock-in by competitors.",[1018],{"type":83,"attrs":1019},{"color":85},{"type":645,"content":1021},[1022],{"type":75,"attrs":1023,"content":1024},{"textAlign":19},[1025,1031],{"text":1026,"type":80,"marks":1027},"AI Sovereignty and the National Bet:",[1028,1030],{"type":83,"attrs":1029},{"color":85},{"type":99},{"text":1032,"type":80,"marks":1033}," She introduces the concept of AI sovereignty—the idea that nations must own or control their AI infrastructure to ensure economic and security independence. For many countries, investing in open-source AI is a \"national bet\" against the hegemony of a few private tech giants.",[1034],{"type":83,"attrs":1035},{"color":85},{"type":645,"content":1037},[1038],{"type":75,"attrs":1039,"content":1040},{"textAlign":19},[1041,1047],{"text":1042,"type":80,"marks":1043},"Regulation as a Safety Floor:",[1044,1046],{"type":83,"attrs":1045},{"color":85},{"type":99},{"text":1048,"type":80,"marks":1049}," Elizabeth argues that while innovation moves fast, regulation provides the necessary safety floor. The next phase of AI development will be defined by how well we balance the \"democratization\" of open source with the \"guardrails\" required to prevent systemic risks.",[1050],{"type":83,"attrs":1051},{"color":85},{"type":75,"attrs":1053},{"textAlign":19},{"type":623,"attrs":1055},{"id":839,"body":1056},[1057],{"_uid":1058,"component":855,"videoTitle":92,"isFullWidth":22,"isAutoplayed":22,"videoTagSource":1059,"placeholderText":92,"placeholderImage":1060},"i-7614efb7-c17c-4378-a90d-967d50adfa3b","https://www.youtube.com/embed/9d29to37eiE?si=KjTrxkTy73mGk5bi",[1061],{"_uid":1062,"component":521,"imageLink":1063,"imageAltText":1065,"mobileImageLink":1066,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"2d4d6a02-b156-4b86-a969-d6f6ca207817",{"id":92,"url":1064,"linktype":507,"fieldtype":95,"cached_url":1064},"https://a.storyblok.com/f/202591/1280x720/1017708619/the-economics-of-open-ai.png","the economics of open AI",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"type":75,"attrs":1068},{"textAlign":19},{"type":865,"content":1070},[1071],{"type":75,"attrs":1072,"content":1073},{"textAlign":19},[1074],{"text":1075,"type":80,"marks":1076},"If there's something you develop that you really want to drive a market demand for, one way to drive that market demand is to make the compliment to that product completely free... You commoditize the compliment to the products you really want to sell.",[1077],{"type":83,"attrs":1078},{"color":85},{"type":580,"attrs":1080,"content":1081},{"level":582,"textAlign":19},[1082],{"text":1083,"type":80,"marks":1084},"Why the AI Advantage Belongs to the Architects",[1085],{"type":83,"attrs":1086},{"color":85},{"type":75,"attrs":1088,"content":1089},{"textAlign":19},[1090,1095,1101],{"text":1091,"type":80,"marks":1092},"The insights from Donato, Bobak, and Elizabeth point to a singular conclusion: the \"New Default\" isn't just about using AI; it's about ",[1093],{"type":83,"attrs":1094},{"color":85},{"text":1096,"type":80,"marks":1097},"owning the architecture",[1098,1100],{"type":83,"attrs":1099},{"color":85},{"type":99},{"text":1102,"type":80,"marks":1103},". We are moving past the era of the \"magic trick\" and into the era of the \"utility.\" The \"New Default\" dictates that the true competitive advantage no longer lies in the ability to write a clever prompt, but in the capability to architect the bedrock beneath it. ",[1104],{"type":83,"attrs":1105},{"color":85},{"type":75,"attrs":1107,"content":1108},{"textAlign":19},[1109],{"text":1110,"type":80,"marks":1111},"Whether it is securing the digital pathways of autonomous agents, weaving intelligence into the physical fabric of our daily wear, or navigating the high-stakes chess match of global AI economics, the focus has shifted from what AI can say to what it can do safely and reliably. In this new epoch, the winners won't be those who merely consume AI, but the architects who build the resilient, embodied, and sovereign systems that allow it to finally inhabit our world.",[1112],{"type":83,"attrs":1113},{"color":85},{"type":75,"attrs":1115,"content":1116},{"textAlign":19},[1117,1123,1132,1142],{"text":1118,"type":80,"marks":1119},"Explore the full interviews and deep dives at",[1120,1122],{"type":83,"attrs":1121},{"color":85},{"type":614},{"text":1124,"type":80,"marks":1125}," ",[1126,1129,1131],{"type":98,"attrs":1127},{"href":1128,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.thenewdefault.com/",{"type":83,"attrs":1130},{"color":85},{"type":614},{"text":609,"type":80,"marks":1133},[1134,1136,1139,1140],{"type":98,"attrs":1135},{"href":1128,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1137},{"color":1138},"#1155CC",{"type":614},{"type":1141},"underline",{"text":1143,"type":80,"marks":1144},".",[1145,1147],{"type":83,"attrs":1146},{"color":85},{"type":614},{"type":623,"attrs":1149},{"id":839,"body":1150},[1151],{"_uid":1152,"margin":1153,"component":1154},"i-fc427883-b8a2-40e5-ac5c-8c4cca11cb2e","24px","BlogSpacer","richTextRenderer","Blog Post Page",[398,386,1158,380],"a58784aa-4408-4d4b-b406-e04bee5078c2",{"type":72,"content":1160},[1161],{"type":75,"attrs":1162,"content":1163},{"textAlign":19},[1164,1166,1170,1172,1176,1178,1182],{"text":1165,"type":80},"Explore the transition from AI \"wrappers\" to resilient, world-model architectures in this expert-led deep dive. Learn how ",{"text":1167,"type":80,"marks":1168},"Donato Capitella",[1169],{"type":99},{"text":1171,"type":80}," (Security), ",{"text":1173,"type":80,"marks":1174},"Bobak Tavangar",[1175],{"type":99},{"text":1177,"type":80}," (Embodied AI), and ",{"text":1179,"type":80,"marks":1180},"Elizabeth Seger",[1181],{"type":99},{"text":1183,"type":80}," (Digital Policy) are defining the \"New Default\" through security-first engineering, wearable AI hardware, and the geopolitical shift toward AI sovereignty. Discover why the future of competitive advantage lies not in prompting, but in building the physical and secure infrastructure that allows AI to move from the chatbot window into the real world.",[1185],{"_uid":1186,"component":521,"imageLink":1187,"imageAltText":557,"mobileImageLink":1189,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"6497a462-5b69-4cfa-890d-a74dec4b38ac",{"id":92,"url":1188,"linktype":507,"fieldtype":95,"cached_url":1188},"https://a.storyblok.com/f/202591/2496x1696/6982f391f4/who-s-defining-the-new-default-speakers-highlights.png",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"who-s-defining-the-new-default-speakers-highlights-part-5","blog/who-s-defining-the-new-default-speakers-highlights-part-5",-7330,[],451289887,"782ce54b-5b59-4508-8e23-876950187ab7",[],{"name":1199,"created_at":1200,"published_at":1201,"updated_at":1202,"id":1203,"uuid":1204,"content":1205,"slug":3484,"full_slug":3485,"sort_by_date":19,"position":3486,"tag_list":3487,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":3488,"first_published_at":1201,"release_id":19,"lang":26,"path":19,"alternates":3489,"default_full_slug":19,"translated_slugs":19},"How To Create a Product Redesign Scope Template (with templates and examples)","2026-04-14T17:58:51.917Z","2026-04-14T18:06:41.810Z","2026-04-14T18:06:41.839Z",165887721170367,"886c7620-b208-4a0d-afa9-a809dede4503",{"seo":1206,"_uid":1217,"title":1199,"Subtitle":1218,"authorId":1219,"postBody":1220,"component":1156,"categoryIds":3472,"postSummary":3475,"featuredImage":3478,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":3483},[1207],{"_uid":1208,"image":1209,"title":1199,"noIndex":22,"component":569,"description":1216,"canonicalUrl":92},"531da741-6ae5-4022-8fc4-100735ed4f46",[1210],{"_uid":1211,"component":521,"imageLink":1212,"imageAltText":1214,"mobileImageLink":1215,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"b65e9518-35e4-4472-ba70-ea3fbdf707f5",{"id":92,"url":1213,"linktype":507,"fieldtype":95,"cached_url":1213},"https://a.storyblok.com/f/202591/2482x1696/c6ea32a40a/gemini_generated_image_rfi7gsrfi7gsrfi7.png","Abstract image representing the concept of a redesign project scope document.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"A product redesign scope template defines the boundaries, goals, deliverables, and success metrics for a redesign project. ","e483019a-fc60-44e9-ba4a-203f148c99e4",[],"de23d188-a323-4cf3-b0b5-d083b10d094a",[1221],{"_uid":1222,"content":1223,"component":1155},"5a4c76bf-ca6d-4180-bed8-3faf3c4e55b1",{"type":72,"content":1224},[1225,1243,1251,1259,1281,1287,1295,1303,1353,1375,1416,1421,1429,1437,1446,1454,1462,1484,1492,1500,1508,1530,1538,1560,1565,1573,1581,1589,1597,1647,1666,1674,1682,1690,1767,1787,1795,1803,1812,1844,1879,1887,1906,1915,1947,1956,1988,1996,2032,2040,2048,2062,2076,2097,2105,2113,2163,2184,2192,2200,2266,2274,2282,2477,2485,2493,2501,2567,2572,2580,2588,2765,2773,2808,2813,2821,2829,2837,2915,2923,2943,2951,2991,2999,3077,3082,3090,3098,3119,3127,3148,3156,3177,3185,3206,3214,3222,3230,3238,3243,3251],{"type":865,"content":1226},[1227],{"type":75,"attrs":1228,"content":1229},{"textAlign":19},[1230,1237],{"text":1231,"type":80,"marks":1232},"TL;DR: ",[1233,1235,1236],{"type":83,"attrs":1234},{"color":85},{"type":99},{"type":614},{"text":1238,"type":80,"marks":1239},"A product redesign scope template defines the boundaries, goals, deliverables, and success metrics for a redesign project. It keeps teams focused, prevents scope creep, and gives stakeholders the context they need to say \"yes.\" Key sections include: project background, objectives, in-scope and out-of-scope features, deliverables, timeline, risks, and success metrics. ",[1240,1242],{"type":83,"attrs":1241},{"color":85},{"type":614},{"type":75,"attrs":1244,"content":1245},{"textAlign":19},[1246],{"text":1247,"type":80,"marks":1248},"Every product eventually needs a redesign. Maybe your conversion rates are slipping, users are frustrated with the navigation, or your interface just looks like it time-traveled from 2016. Whatever the reason, jumping straight into pixels and prototypes without a clear scope is one of the fastest ways to derail a redesign project.",[1249],{"type":83,"attrs":1250},{"color":85},{"type":75,"attrs":1252,"content":1253},{"textAlign":19},[1254],{"text":1255,"type":80,"marks":1256},"A product redesign scope template is the document that keeps everyone aligned on what you're redesigning, why you're redesigning it, and how you'll know when it's done. Designers and developers, stakeholders and executives, all on the same page.",[1257],{"type":83,"attrs":1258},{"color":85},{"type":75,"attrs":1260,"content":1261},{"textAlign":19},[1262,1267,1276],{"text":1263,"type":80,"marks":1264},"In this guide, we'll walk through everything that goes into a ",[1265],{"type":83,"attrs":1266},{"color":85},{"text":1268,"type":80,"marks":1269},"solid product redesign",[1270,1273,1275],{"type":98,"attrs":1271},{"href":1272,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/services/product-design-services/ux-ui-design",{"type":83,"attrs":1274},{"color":1138},{"type":1141},{"text":1277,"type":80,"marks":1278}," scope document, share free templates you can start using today, and cover practical tips from designers who've been through large-scale redesigns.",[1279],{"type":83,"attrs":1280},{"color":85},{"type":623,"attrs":1282},{"id":1283,"body":1284},"78fadce4-8c3d-4091-8e36-01ef834c4b91",[1285],{"_uid":1286,"margin":1153,"component":1154},"i-575c2f67-c7db-48ee-ac68-0a55cd2ad6d4",{"type":580,"attrs":1288,"content":1289},{"level":582,"textAlign":19},[1290],{"text":1291,"type":80,"marks":1292},"What is a product redesign scope?",[1293],{"type":83,"attrs":1294},{"color":85},{"type":75,"attrs":1296,"content":1297},{"textAlign":19},[1298],{"text":1299,"type":80,"marks":1300},"A product redesign scope is a document that defines the boundaries of a redesign project. It answers three fundamental questions:",[1301],{"type":83,"attrs":1302},{"color":85},{"type":642,"content":1304},[1305,1321,1337],{"type":645,"content":1306},[1307],{"type":75,"attrs":1308,"content":1309},{"textAlign":19},[1310,1316],{"text":1311,"type":80,"marks":1312},"What are we changing?",[1313,1315],{"type":83,"attrs":1314},{"color":85},{"type":99},{"text":1317,"type":80,"marks":1318}," Which parts of the product are being redesigned, and which are staying as they are?",[1319],{"type":83,"attrs":1320},{"color":85},{"type":645,"content":1322},[1323],{"type":75,"attrs":1324,"content":1325},{"textAlign":19},[1326,1332],{"text":1327,"type":80,"marks":1328},"Why are we changing it?",[1329,1331],{"type":83,"attrs":1330},{"color":85},{"type":99},{"text":1333,"type":80,"marks":1334}," What business problem, user pain point, or strategic goal is driving the redesign?",[1335],{"type":83,"attrs":1336},{"color":85},{"type":645,"content":1338},[1339],{"type":75,"attrs":1340,"content":1341},{"textAlign":19},[1342,1348],{"text":1343,"type":80,"marks":1344},"What does \"done\" look like?",[1345,1347],{"type":83,"attrs":1346},{"color":85},{"type":99},{"text":1349,"type":80,"marks":1350}," What are the specific deliverables, milestones, and success metrics?",[1351],{"type":83,"attrs":1352},{"color":85},{"type":75,"attrs":1354,"content":1355},{"textAlign":19},[1356,1361,1370],{"text":1357,"type":80,"marks":1358},"Think of it as a contract between ",[1359],{"type":83,"attrs":1360},{"color":85},{"text":1362,"type":80,"marks":1363},"the design team",[1364,1367,1369],{"type":98,"attrs":1365},{"href":1366,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/services/product-design",{"type":83,"attrs":1368},{"color":1138},{"type":1141},{"text":1371,"type":80,"marks":1372}," and the rest of the organization. Without one, redesign projects tend to expand in unpredictable ways -- a homepage refresh turns into a full navigation overhaul, which turns into a design system rebuild, which turns into six months of missed deadlines and frustrated stakeholders.",[1373],{"type":83,"attrs":1374},{"color":85},{"type":75,"attrs":1376,"content":1377},{"textAlign":19},[1378,1383,1389,1394,1400,1405,1411],{"text":1379,"type":80,"marks":1380},"The scope document is sometimes called a ",[1381],{"type":83,"attrs":1382},{"color":85},{"text":1384,"type":80,"marks":1385},"product redesign brief",[1386,1388],{"type":83,"attrs":1387},{"color":85},{"type":99},{"text":1390,"type":80,"marks":1391},", a ",[1392],{"type":83,"attrs":1393},{"color":85},{"text":1395,"type":80,"marks":1396},"design scope statement",[1397,1399],{"type":83,"attrs":1398},{"color":85},{"type":99},{"text":1401,"type":80,"marks":1402},", or a ",[1403],{"type":83,"attrs":1404},{"color":85},{"text":1406,"type":80,"marks":1407},"project scope document",[1408,1410],{"type":83,"attrs":1409},{"color":85},{"type":99},{"text":1412,"type":80,"marks":1413},". The terminology varies across teams and industries, but the purpose is the same: define the work before the work begins.",[1414],{"type":83,"attrs":1415},{"color":85},{"type":623,"attrs":1417},{"id":1283,"body":1418},[1419],{"_uid":1420,"margin":1153,"component":1154},"i-4ed27a11-7fb1-4b52-9cf0-dab779edb190",{"type":580,"attrs":1422,"content":1423},{"level":582,"textAlign":19},[1424],{"text":1425,"type":80,"marks":1426},"Why you need a product redesign scope document",[1427],{"type":83,"attrs":1428},{"color":85},{"type":75,"attrs":1430,"content":1431},{"textAlign":19},[1432],{"text":1433,"type":80,"marks":1434},"You might be tempted to skip the scoping phase and jump straight into design. After all, the problems are obvious, right? Here's why that almost never works:",[1435],{"type":83,"attrs":1436},{"color":85},{"type":580,"attrs":1438,"content":1439},{"level":633,"textAlign":19},[1440],{"text":1441,"type":80,"marks":1442},"It prevents scope creep",[1443],{"type":83,"attrs":1444},{"color":1445},"#434343",{"type":75,"attrs":1447,"content":1448},{"textAlign":19},[1449],{"text":1450,"type":80,"marks":1451},"Scope creep is the silent killer of redesign projects. Without clear boundaries, every stakeholder meeting introduces new \"nice-to-have\" features that quietly become must-haves. A well-defined scope gives you something concrete to point to when someone asks, \"Can we also redesign the settings page while we're at it?\"",[1452],{"type":83,"attrs":1453},{"color":85},{"type":580,"attrs":1455,"content":1456},{"level":633,"textAlign":19},[1457],{"text":1458,"type":80,"marks":1459},"It aligns stakeholders early",[1460],{"type":83,"attrs":1461},{"color":1445},{"type":75,"attrs":1463,"content":1464},{"textAlign":19},[1465,1470,1479],{"text":1466,"type":80,"marks":1467},"As ",[1468],{"type":83,"attrs":1469},{"color":85},{"text":1471,"type":80,"marks":1472},"Nick Babich writes on UXPlanet",[1473,1476,1478],{"type":98,"attrs":1474},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://uxplanet.org/product-redesign-proposal-structure-tips-0aa86aedaacf",{"type":83,"attrs":1477},{"color":1138},{"type":1141},{"text":1480,"type":80,"marks":1481},", \"When proposing redesign to stakeholders, you should prepare a document that will create a proper context for them and provide answers to the most common questions they likely have.\" A scope document gets everyone on the same page before a single wireframe is drawn.",[1482],{"type":83,"attrs":1483},{"color":85},{"type":580,"attrs":1485,"content":1486},{"level":633,"textAlign":19},[1487],{"text":1488,"type":80,"marks":1489},"It forces you to define success",[1490],{"type":83,"attrs":1491},{"color":1445},{"type":75,"attrs":1493,"content":1494},{"textAlign":19},[1495],{"text":1496,"type":80,"marks":1497},"Vague goals like \"improve the user experience\" or \"make it more modern\" are almost impossible to measure. A scope document requires you to define specific, measurable outcomes -- like reducing checkout abandonment by 15% or cutting support tickets related to navigation by 20%.",[1498],{"type":83,"attrs":1499},{"color":85},{"type":580,"attrs":1501,"content":1502},{"level":633,"textAlign":19},[1503],{"text":1504,"type":80,"marks":1505},"It's a negotiation tool",[1506],{"type":83,"attrs":1507},{"color":1445},{"type":75,"attrs":1509,"content":1510},{"textAlign":19},[1511,1516,1525],{"text":1512,"type":80,"marks":1513},"Project timelines proposed by executives rarely match reality. As one project management expert ",[1514],{"type":83,"attrs":1515},{"color":85},{"text":1517,"type":80,"marks":1518},"explains",[1519,1522,1524],{"type":98,"attrs":1520},{"href":1521,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.youtube.com/watch?v=5OkIqlJFCBE",{"type":83,"attrs":1523},{"color":1138},{"type":1141},{"text":1526,"type":80,"marks":1527},", having a documented scope with a high-level timeline is \"an awesome negotiation tool\" that lets you push back on unrealistic deadlines with evidence rather than opinions.",[1528],{"type":83,"attrs":1529},{"color":85},{"type":580,"attrs":1531,"content":1532},{"level":633,"textAlign":19},[1533],{"text":1534,"type":80,"marks":1535},"It protects the team",[1536],{"type":83,"attrs":1537},{"color":1445},{"type":75,"attrs":1539,"content":1540},{"textAlign":19},[1541,1546,1555],{"text":1542,"type":80,"marks":1543},"Redesign projects can be politically charged. As one experienced designer ",[1544],{"type":83,"attrs":1545},{"color":85},{"text":1547,"type":80,"marks":1548},"put it on Reddit",[1549,1552,1554],{"type":98,"attrs":1550},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.reddit.com/r/UXDesign/comments/1mcpoif/how_do_you_handle_a_full_redesign_after_a_major/",{"type":83,"attrs":1553},{"color":1138},{"type":1141},{"text":1556,"type":80,"marks":1557},", \"People lose metaphorical limbs in these types of projects because they can be political battles dressed up as 'transformation' and/or 'modernization.' Proceed with caution, do your due diligence, invest in stakeholder management upfront.\" A written scope document is your due diligence.",[1558],{"type":83,"attrs":1559},{"color":85},{"type":623,"attrs":1561},{"id":1283,"body":1562},[1563],{"_uid":1564,"margin":1153,"component":1154},"i-8d894834-4a4f-42ba-ac0e-adf400145e16",{"type":580,"attrs":1566,"content":1567},{"level":582,"textAlign":19},[1568],{"text":1569,"type":80,"marks":1570},"What to include in your product redesign scope template",[1571],{"type":83,"attrs":1572},{"color":85},{"type":75,"attrs":1574,"content":1575},{"textAlign":19},[1576],{"text":1577,"type":80,"marks":1578},"A comprehensive product redesign scope document covers nine key areas. Here's what each section should contain and why it matters.",[1579],{"type":83,"attrs":1580},{"color":85},{"type":580,"attrs":1582,"content":1583},{"level":633,"textAlign":19},[1584],{"text":1585,"type":80,"marks":1586},"1. Project overview and background",[1587],{"type":83,"attrs":1588},{"color":1445},{"type":75,"attrs":1590,"content":1591},{"textAlign":19},[1592],{"text":1593,"type":80,"marks":1594},"Start with the basics: what is this project, and why does it exist?",[1595],{"type":83,"attrs":1596},{"color":85},{"type":642,"content":1598},[1599,1615,1631],{"type":645,"content":1600},[1601],{"type":75,"attrs":1602,"content":1603},{"textAlign":19},[1604,1610],{"text":1605,"type":80,"marks":1606},"Project name",[1607,1609],{"type":83,"attrs":1608},{"color":85},{"type":99},{"text":1611,"type":80,"marks":1612}," -- Even a simple working title keeps everyone referring to the same initiative.",[1613],{"type":83,"attrs":1614},{"color":85},{"type":645,"content":1616},[1617],{"type":75,"attrs":1618,"content":1619},{"textAlign":19},[1620,1626],{"text":1621,"type":80,"marks":1622},"Project manager and product owner",[1623,1625],{"type":83,"attrs":1624},{"color":85},{"type":99},{"text":1627,"type":80,"marks":1628}," -- Who's accountable for delivery, and who owns the product decisions?",[1629],{"type":83,"attrs":1630},{"color":85},{"type":645,"content":1632},[1633],{"type":75,"attrs":1634,"content":1635},{"textAlign":19},[1636,1642],{"text":1637,"type":80,"marks":1638},"Background and rationale",[1639,1641],{"type":83,"attrs":1640},{"color":85},{"type":99},{"text":1643,"type":80,"marks":1644}," -- Why are we redesigning? Be specific. \"Low conversion rates on mobile checkout,\" \"user feedback consistently flags confusing navigation,\" or \"brand refresh following acquisition\" are all valid reasons. Avoid vague justifications like \"it's time for a refresh.\"",[1645],{"type":83,"attrs":1646},{"color":85},{"type":75,"attrs":1648,"content":1649},{"textAlign":19},[1650,1655,1661],{"text":1651,"type":80,"marks":1652},"The background section is critical because, as the project management saying goes, it lets people understand ",[1653],{"type":83,"attrs":1654},{"color":85},{"text":1656,"type":80,"marks":1657},"why they're doing what they're doing",[1658,1660],{"type":83,"attrs":1659},{"color":85},{"type":614},{"text":1662,"type":80,"marks":1663},". Without context, team members are just pushing pixels with no sense of purpose.",[1664],{"type":83,"attrs":1665},{"color":85},{"type":580,"attrs":1667,"content":1668},{"level":633,"textAlign":19},[1669],{"text":1670,"type":80,"marks":1671},"2. Current state analysis",[1672],{"type":83,"attrs":1673},{"color":1445},{"type":75,"attrs":1675,"content":1676},{"textAlign":19},[1677],{"text":1678,"type":80,"marks":1679},"Before you can fix something, you need to understand what's broken. This section is especially important when presenting to stakeholders who may not be aware of the current product's shortcomings.",[1680],{"type":83,"attrs":1681},{"color":85},{"type":75,"attrs":1683,"content":1684},{"textAlign":19},[1685],{"text":1686,"type":80,"marks":1687},"Include:",[1688],{"type":83,"attrs":1689},{"color":85},{"type":642,"content":1691},[1692,1722,1738],{"type":645,"content":1693},[1694],{"type":75,"attrs":1695,"content":1696},{"textAlign":19},[1697,1703,1708,1717],{"text":1698,"type":80,"marks":1699},"UX audit findings",[1700,1702],{"type":83,"attrs":1701},{"color":85},{"type":99},{"text":1704,"type":80,"marks":1705}," -- Summarize insights from heuristic evaluations, usability testing, and user research. ",[1706],{"type":83,"attrs":1707},{"color":85},{"text":1709,"type":80,"marks":1710},"Maze's UX audit framework",[1711,1714,1716],{"type":98,"attrs":1712},{"href":1713,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://maze.co/guides/ux-audit/",{"type":83,"attrs":1715},{"color":1138},{"type":1141},{"text":1718,"type":80,"marks":1719}," is a helpful starting point.",[1720],{"type":83,"attrs":1721},{"color":85},{"type":645,"content":1723},[1724],{"type":75,"attrs":1725,"content":1726},{"textAlign":19},[1727,1733],{"text":1728,"type":80,"marks":1729},"Pain points",[1730,1732],{"type":83,"attrs":1731},{"color":85},{"type":99},{"text":1734,"type":80,"marks":1735}," -- What specific friction points are users experiencing? Connect these to business impact. \"Users abandon the checkout flow at step 3\" is more persuasive than \"the checkout flow could be better.\"",[1736],{"type":83,"attrs":1737},{"color":85},{"type":645,"content":1739},[1740],{"type":75,"attrs":1741,"content":1742},{"textAlign":19},[1743,1749,1754,1762],{"text":1744,"type":80,"marks":1745},"Competitive analysis",[1746,1748],{"type":83,"attrs":1747},{"color":85},{"type":99},{"text":1750,"type":80,"marks":1751}," -- What are competitors doing differently? This is ",[1752],{"type":83,"attrs":1753},{"color":85},{"text":1755,"type":80,"marks":1756},"especially valuable",[1757,1759,1761],{"type":98,"attrs":1758},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1760},{"color":1138},{"type":1141},{"text":1763,"type":80,"marks":1764}," if you're proposing visual design changes or new features.",[1765],{"type":83,"attrs":1766},{"color":85},{"type":75,"attrs":1768,"content":1769},{"textAlign":19},[1770,1774,1782],{"text":1466,"type":80,"marks":1771},[1772],{"type":83,"attrs":1773},{"color":85},{"text":1775,"type":80,"marks":1776},"one designer advises",[1777,1779,1781],{"type":98,"attrs":1778},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1780},{"color":1138},{"type":1141},{"text":1783,"type":80,"marks":1784},", \"Focus on UX discovery as the first order of business. What are the key tasks for your users? What are the pain and pleasure points of the existing application? What are your key differentiators and gaps with your competitors?\"",[1785],{"type":83,"attrs":1786},{"color":85},{"type":580,"attrs":1788,"content":1789},{"level":633,"textAlign":19},[1790],{"text":1791,"type":80,"marks":1792},"3. Objectives and success metrics",[1793],{"type":83,"attrs":1794},{"color":1445},{"type":75,"attrs":1796,"content":1797},{"textAlign":19},[1798],{"text":1799,"type":80,"marks":1800},"This is where you define what success looks like, in measurable terms. Use the SMART framework (Specific, Measurable, Attainable, Relevant, Time-bound) or OKRs (Objectives and Key Results) to structure your goals.",[1801],{"type":83,"attrs":1802},{"color":85},{"type":75,"attrs":1804,"content":1805},{"textAlign":19},[1806],{"text":1807,"type":80,"marks":1808},"Examples:",[1809,1811],{"type":83,"attrs":1810},{"color":85},{"type":99},{"type":642,"content":1813},[1814,1824,1834],{"type":645,"content":1815},[1816],{"type":75,"attrs":1817,"content":1818},{"textAlign":19},[1819],{"text":1820,"type":80,"marks":1821},"Improve checkout conversion rate by 20% within 90 days of launch",[1822],{"type":83,"attrs":1823},{"color":85},{"type":645,"content":1825},[1826],{"type":75,"attrs":1827,"content":1828},{"textAlign":19},[1829],{"text":1830,"type":80,"marks":1831},"Reduce customer support tickets related to navigation by 15% by end of Q3",[1832],{"type":83,"attrs":1833},{"color":85},{"type":645,"content":1835},[1836],{"type":75,"attrs":1837,"content":1838},{"textAlign":19},[1839],{"text":1840,"type":80,"marks":1841},"Achieve a System Usability Scale (SUS) score of 80+ in post-launch usability testing",[1842],{"type":83,"attrs":1843},{"color":85},{"type":75,"attrs":1845,"content":1846},{"textAlign":19},[1847,1852,1861,1866,1874],{"text":1848,"type":80,"marks":1849},"Google's ",[1850],{"type":83,"attrs":1851},{"color":85},{"text":1853,"type":80,"marks":1854},"HEART framework",[1855,1858,1860],{"type":98,"attrs":1856},{"href":1857,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://research.google/pubs/measuring-the-user-experience-on-a-large-scale-user-centered-metrics-for-web-applications/",{"type":83,"attrs":1859},{"color":1138},{"type":1141},{"text":1862,"type":80,"marks":1863}," (Happiness, Engagement, Adoption, Retention, Task success) is another ",[1864],{"type":83,"attrs":1865},{"color":85},{"text":1867,"type":80,"marks":1868},"excellent tool",[1869,1871,1873],{"type":98,"attrs":1870},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":1872},{"color":1138},{"type":1141},{"text":1875,"type":80,"marks":1876}," for identifying the right metrics for your redesign.",[1877],{"type":83,"attrs":1878},{"color":85},{"type":580,"attrs":1880,"content":1881},{"level":633,"textAlign":19},[1882],{"text":1883,"type":80,"marks":1884},"4. Product scope: in-scope and out-of-scope",[1885],{"type":83,"attrs":1886},{"color":1445},{"type":75,"attrs":1888,"content":1889},{"textAlign":19},[1890,1895,1901],{"text":1891,"type":80,"marks":1892},"This is the heart of the document. Clearly define what's included in the redesign and, just as importantly, what's ",[1893],{"type":83,"attrs":1894},{"color":85},{"text":1896,"type":80,"marks":1897},"not",[1898,1900],{"type":83,"attrs":1899},{"color":85},{"type":614},{"text":1902,"type":80,"marks":1903}," included.",[1904],{"type":83,"attrs":1905},{"color":85},{"type":75,"attrs":1907,"content":1908},{"textAlign":19},[1909],{"text":1910,"type":80,"marks":1911},"In-scope examples:",[1912,1914],{"type":83,"attrs":1913},{"color":85},{"type":99},{"type":642,"content":1916},[1917,1927,1937],{"type":645,"content":1918},[1919],{"type":75,"attrs":1920,"content":1921},{"textAlign":19},[1922],{"text":1923,"type":80,"marks":1924},"Redesigning the home page and product listing pages",[1925],{"type":83,"attrs":1926},{"color":85},{"type":645,"content":1928},[1929],{"type":75,"attrs":1930,"content":1931},{"textAlign":19},[1932],{"text":1933,"type":80,"marks":1934},"Implementing a new responsive navigation system",[1935],{"type":83,"attrs":1936},{"color":85},{"type":645,"content":1938},[1939],{"type":75,"attrs":1940,"content":1941},{"textAlign":19},[1942],{"text":1943,"type":80,"marks":1944},"Upgrading the checkout form from 4 steps to 2",[1945],{"type":83,"attrs":1946},{"color":85},{"type":75,"attrs":1948,"content":1949},{"textAlign":19},[1950],{"text":1951,"type":80,"marks":1952},"Out-of-scope examples:",[1953,1955],{"type":83,"attrs":1954},{"color":85},{"type":99},{"type":642,"content":1957},[1958,1968,1978],{"type":645,"content":1959},[1960],{"type":75,"attrs":1961,"content":1962},{"textAlign":19},[1963],{"text":1964,"type":80,"marks":1965},"Mobile app redesign (web only for this phase)",[1966],{"type":83,"attrs":1967},{"color":85},{"type":645,"content":1969},[1970],{"type":75,"attrs":1971,"content":1972},{"textAlign":19},[1973],{"text":1974,"type":80,"marks":1975},"Backend CRM system changes",[1976],{"type":83,"attrs":1977},{"color":85},{"type":645,"content":1979},[1980],{"type":75,"attrs":1981,"content":1982},{"textAlign":19},[1983],{"text":1984,"type":80,"marks":1985},"Content migration of blog posts older than 2024",[1986],{"type":83,"attrs":1987},{"color":85},{"type":75,"attrs":1989,"content":1990},{"textAlign":19},[1991],{"text":1992,"type":80,"marks":1993},"The out-of-scope list is arguably more important than the in-scope list. It eliminates assumptions and gives you a clear reference when scope creep starts knocking. As one project management practitioner explains, \"The ins and outs become really helpful because it gives you even greater clarity with what exactly you're going to be doing and not doing, and can eliminate some assumptions.\"",[1994],{"type":83,"attrs":1995},{"color":85},{"type":75,"attrs":1997,"content":1998},{"textAlign":19},[1999,2005,2010,2016,2021,2027],{"text":2000,"type":80,"marks":2001},"Pro tip:",[2002,2004],{"type":83,"attrs":2003},{"color":85},{"type":99},{"text":2006,"type":80,"marks":2007}," It's important to distinguish between ",[2008],{"type":83,"attrs":2009},{"color":85},{"text":2011,"type":80,"marks":2012},"project scope",[2013,2015],{"type":83,"attrs":2014},{"color":85},{"type":614},{"text":2017,"type":80,"marks":2018}," and ",[2019],{"type":83,"attrs":2020},{"color":85},{"text":2022,"type":80,"marks":2023},"product scope",[2024,2026],{"type":83,"attrs":2025},{"color":85},{"type":614},{"text":2028,"type":80,"marks":2029},". Project scope is the work, the meetings, design hours, and review cycles. Product scope is the functionality, the new buttons, new layouts, and new features. Your scope document should address both.",[2030],{"type":83,"attrs":2031},{"color":85},{"type":580,"attrs":2033,"content":2034},{"level":633,"textAlign":19},[2035],{"text":2036,"type":80,"marks":2037},"5. Vision and strategy",[2038],{"type":83,"attrs":2039},{"color":1445},{"type":75,"attrs":2041,"content":2042},{"textAlign":19},[2043],{"text":2044,"type":80,"marks":2045},"Include a clear, concise vision statement that answers: \"Where are we heading and why?\" This should be one or two sentences that the entire team can understand and rally behind.",[2046],{"type":83,"attrs":2047},{"color":85},{"type":75,"attrs":2049,"content":2050},{"textAlign":19},[2051,2057],{"text":2052,"type":80,"marks":2053},"Good vision statement:",[2054,2056],{"type":83,"attrs":2055},{"color":85},{"type":99},{"text":2058,"type":80,"marks":2059}," \"Redesign our checkout experience to be the fastest and most intuitive in the industry, reducing friction and building trust at every step.\"",[2060],{"type":83,"attrs":2061},{"color":85},{"type":75,"attrs":2063,"content":2064},{"textAlign":19},[2065,2071],{"text":2066,"type":80,"marks":2067},"Bad vision statement:",[2068,2070],{"type":83,"attrs":2069},{"color":85},{"type":99},{"text":2072,"type":80,"marks":2073}," \"To be the best eCommerce platform in the world.\" (Too vague, no direction.)",[2074],{"type":83,"attrs":2075},{"color":85},{"type":75,"attrs":2077,"content":2078},{"textAlign":19},[2079,2084,2092],{"text":2080,"type":80,"marks":2081},"The vision statement serves as the ",[2082],{"type":83,"attrs":2083},{"color":85},{"text":2085,"type":80,"marks":2086},"foundation for your strategy goals",[2087,2089,2091],{"type":98,"attrs":2088},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":2090},{"color":1138},{"type":1141},{"text":2093,"type":80,"marks":2094},". When tough trade-off decisions come up during the project, the vision is what helps the team decide which path to take.",[2095],{"type":83,"attrs":2096},{"color":85},{"type":580,"attrs":2098,"content":2099},{"level":633,"textAlign":19},[2100],{"text":2101,"type":80,"marks":2102},"6. Proposed solution",[2103],{"type":83,"attrs":2104},{"color":1445},{"type":75,"attrs":2106,"content":2107},{"textAlign":19},[2108],{"text":2109,"type":80,"marks":2110},"Now show stakeholders a preview of what you're building. Depending on the type of redesign, this might include:",[2111],{"type":83,"attrs":2112},{"color":85},{"type":642,"content":2114},[2115,2131,2147],{"type":645,"content":2116},[2117],{"type":75,"attrs":2118,"content":2119},{"textAlign":19},[2120,2126],{"text":2121,"type":80,"marks":2122},"Information architecture improvements",[2123,2125],{"type":83,"attrs":2124},{"color":85},{"type":99},{"text":2127,"type":80,"marks":2128}," -- Updated sitemaps, navigation structures, and content hierarchies.",[2129],{"type":83,"attrs":2130},{"color":85},{"type":645,"content":2132},[2133],{"type":75,"attrs":2134,"content":2135},{"textAlign":19},[2136,2142],{"text":2137,"type":80,"marks":2138},"Interaction design changes",[2139,2141],{"type":83,"attrs":2140},{"color":85},{"type":99},{"text":2143,"type":80,"marks":2144}," -- New user flows, interaction patterns, and journey maps.",[2145],{"type":83,"attrs":2146},{"color":85},{"type":645,"content":2148},[2149],{"type":75,"attrs":2150,"content":2151},{"textAlign":19},[2152,2158],{"text":2153,"type":80,"marks":2154},"Visual design direction",[2155,2157],{"type":83,"attrs":2156},{"color":85},{"type":99},{"text":2159,"type":80,"marks":2160}," -- Color schemes, typography, imagery, and overall aesthetic.",[2161],{"type":83,"attrs":2162},{"color":85},{"type":75,"attrs":2164,"content":2165},{"textAlign":19},[2166,2171,2179],{"text":2167,"type":80,"marks":2168},"One important note from ",[2169],{"type":83,"attrs":2170},{"color":85},{"text":2172,"type":80,"marks":2173},"UXPlanet",[2174,2176,2178],{"type":98,"attrs":2175},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":2177},{"color":1138},{"type":1141},{"text":2180,"type":80,"marks":2181},": \"When communicating new designs to stakeholders, try to avoid using low-fidelity wireframes because wireframes can easily create an impression of unfinished design. Not all stakeholders understand how grey boxes and arrows will translate into pixel-perfect design.\" Use high-fidelity mockups whenever possible.",[2182],{"type":83,"attrs":2183},{"color":85},{"type":580,"attrs":2185,"content":2186},{"level":633,"textAlign":19},[2187],{"text":2188,"type":80,"marks":2189},"7. Key deliverables",[2190],{"type":83,"attrs":2191},{"color":1445},{"type":75,"attrs":2193,"content":2194},{"textAlign":19},[2195],{"text":2196,"type":80,"marks":2197},"Be explicit about what the project will produce. Typical deliverables include:",[2198],{"type":83,"attrs":2199},{"color":85},{"type":642,"content":2201},[2202,2218,2234,2250],{"type":645,"content":2203},[2204],{"type":75,"attrs":2205,"content":2206},{"textAlign":19},[2207,2213],{"text":2208,"type":80,"marks":2209},"Research and discovery:",[2210,2212],{"type":83,"attrs":2211},{"color":85},{"type":99},{"text":2214,"type":80,"marks":2215}," User journey maps, competitive audit, stakeholder interview report",[2216],{"type":83,"attrs":2217},{"color":85},{"type":645,"content":2219},[2220],{"type":75,"attrs":2221,"content":2222},{"textAlign":19},[2223,2229],{"text":2224,"type":80,"marks":2225},"Design assets:",[2226,2228],{"type":83,"attrs":2227},{"color":85},{"type":99},{"text":2230,"type":80,"marks":2231}," Wireframes, high-fidelity UI mockups, interactive prototypes, updated design system components",[2232],{"type":83,"attrs":2233},{"color":85},{"type":645,"content":2235},[2236],{"type":75,"attrs":2237,"content":2238},{"textAlign":19},[2239,2245],{"text":2240,"type":80,"marks":2241},"Development and technical:",[2242,2244],{"type":83,"attrs":2243},{"color":85},{"type":99},{"text":2246,"type":80,"marks":2247}," Front-end code, API integrations, QA test results",[2248],{"type":83,"attrs":2249},{"color":85},{"type":645,"content":2251},[2252],{"type":75,"attrs":2253,"content":2254},{"textAlign":19},[2255,2261],{"text":2256,"type":80,"marks":2257},"Documentation:",[2258,2260],{"type":83,"attrs":2259},{"color":85},{"type":99},{"text":2262,"type":80,"marks":2263}," Design specifications for engineers, updated style guide",[2264],{"type":83,"attrs":2265},{"color":85},{"type":580,"attrs":2267,"content":2268},{"level":633,"textAlign":19},[2269],{"text":2270,"type":80,"marks":2271},"8. Timeline and milestones",[2272],{"type":83,"attrs":2273},{"color":1445},{"type":75,"attrs":2275,"content":2276},{"textAlign":19},[2277],{"text":2278,"type":80,"marks":2279},"Map out the major phases and dates:",[2280],{"type":83,"attrs":2281},{"color":85},{"type":2283,"content":2284},"table",[2285,2314,2339,2362,2385,2408,2431,2454],{"type":2286,"content":2287},"tableRow",[2288,2302],{"type":2289,"attrs":2290,"content":2292},"tableHeader",{"colspan":2291,"rowspan":2291,"colwidth":19},1,[2293],{"type":75,"attrs":2294,"content":2295},{"textAlign":19},[2296],{"text":2297,"type":80,"marks":2298},"Milestone",[2299,2301],{"type":83,"attrs":2300},{"color":85},{"type":99},{"type":2289,"attrs":2303,"content":2304},{"colspan":2291,"rowspan":2291,"colwidth":19},[2305],{"type":75,"attrs":2306,"content":2307},{"textAlign":19},[2308],{"text":2309,"type":80,"marks":2310},"Target date",[2311,2313],{"type":83,"attrs":2312},{"color":85},{"type":99},{"type":2286,"content":2315},[2316,2328],{"type":2317,"attrs":2318,"content":2319},"tableCell",{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2320],{"type":75,"attrs":2321,"content":2322},{"textAlign":19},[2323],{"text":2324,"type":80,"marks":2325},"Project kickoff",[2326],{"type":83,"attrs":2327},{"color":85},{"type":2317,"attrs":2329,"content":2330},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2331],{"type":75,"attrs":2332,"content":2333},{"textAlign":19},[2334],{"text":2335,"type":80,"marks":2336},"[Date]",[2337],{"type":83,"attrs":2338},{"color":85},{"type":2286,"content":2340},[2341,2352],{"type":2317,"attrs":2342,"content":2343},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2344],{"type":75,"attrs":2345,"content":2346},{"textAlign":19},[2347],{"text":2348,"type":80,"marks":2349},"Discovery phase complete",[2350],{"type":83,"attrs":2351},{"color":85},{"type":2317,"attrs":2353,"content":2354},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2355],{"type":75,"attrs":2356,"content":2357},{"textAlign":19},[2358],{"text":2335,"type":80,"marks":2359},[2360],{"type":83,"attrs":2361},{"color":85},{"type":2286,"content":2363},[2364,2375],{"type":2317,"attrs":2365,"content":2366},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2367],{"type":75,"attrs":2368,"content":2369},{"textAlign":19},[2370],{"text":2371,"type":80,"marks":2372},"Initial design mockups",[2373],{"type":83,"attrs":2374},{"color":85},{"type":2317,"attrs":2376,"content":2377},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2378],{"type":75,"attrs":2379,"content":2380},{"textAlign":19},[2381],{"text":2335,"type":80,"marks":2382},[2383],{"type":83,"attrs":2384},{"color":85},{"type":2286,"content":2386},[2387,2398],{"type":2317,"attrs":2388,"content":2389},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2390],{"type":75,"attrs":2391,"content":2392},{"textAlign":19},[2393],{"text":2394,"type":80,"marks":2395},"Prototype sign-off",[2396],{"type":83,"attrs":2397},{"color":85},{"type":2317,"attrs":2399,"content":2400},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2401],{"type":75,"attrs":2402,"content":2403},{"textAlign":19},[2404],{"text":2335,"type":80,"marks":2405},[2406],{"type":83,"attrs":2407},{"color":85},{"type":2286,"content":2409},[2410,2421],{"type":2317,"attrs":2411,"content":2412},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2413],{"type":75,"attrs":2414,"content":2415},{"textAlign":19},[2416],{"text":2417,"type":80,"marks":2418},"Development start",[2419],{"type":83,"attrs":2420},{"color":85},{"type":2317,"attrs":2422,"content":2423},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2424],{"type":75,"attrs":2425,"content":2426},{"textAlign":19},[2427],{"text":2335,"type":80,"marks":2428},[2429],{"type":83,"attrs":2430},{"color":85},{"type":2286,"content":2432},[2433,2444],{"type":2317,"attrs":2434,"content":2435},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2436],{"type":75,"attrs":2437,"content":2438},{"textAlign":19},[2439],{"text":2440,"type":80,"marks":2441},"User acceptance testing (UAT)",[2442],{"type":83,"attrs":2443},{"color":85},{"type":2317,"attrs":2445,"content":2446},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2447],{"type":75,"attrs":2448,"content":2449},{"textAlign":19},[2450],{"text":2335,"type":80,"marks":2451},[2452],{"type":83,"attrs":2453},{"color":85},{"type":2286,"content":2455},[2456,2467],{"type":2317,"attrs":2457,"content":2458},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2459],{"type":75,"attrs":2460,"content":2461},{"textAlign":19},[2462],{"text":2463,"type":80,"marks":2464},"Final launch",[2465],{"type":83,"attrs":2466},{"color":85},{"type":2317,"attrs":2468,"content":2469},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2470],{"type":75,"attrs":2471,"content":2472},{"textAlign":19},[2473],{"text":2335,"type":80,"marks":2474},[2475],{"type":83,"attrs":2476},{"color":85},{"type":75,"attrs":2478,"content":2479},{"textAlign":19},[2480],{"text":2481,"type":80,"marks":2482},"Keep the timeline high-level at this stage. The detailed project plan comes later. The purpose here is to set expectations and give stakeholders a realistic picture of the timeline, which often differs significantly from what executives initially expect.",[2483],{"type":83,"attrs":2484},{"color":85},{"type":580,"attrs":2486,"content":2487},{"level":633,"textAlign":19},[2488],{"text":2489,"type":80,"marks":2490},"9. Risks, assumptions, and approvals",[2491],{"type":83,"attrs":2492},{"color":1445},{"type":75,"attrs":2494,"content":2495},{"textAlign":19},[2496],{"text":2497,"type":80,"marks":2498},"Round out the document with:",[2499],{"type":83,"attrs":2500},{"color":85},{"type":642,"content":2502},[2503,2519,2535,2551],{"type":645,"content":2504},[2505],{"type":75,"attrs":2506,"content":2507},{"textAlign":19},[2508,2514],{"text":2509,"type":80,"marks":2510},"Assumptions",[2511,2513],{"type":83,"attrs":2512},{"color":85},{"type":99},{"text":2515,"type":80,"marks":2516}," -- Things you're taking for granted that could change. Example: \"The current API will support the new frontend framework.\"",[2517],{"type":83,"attrs":2518},{"color":85},{"type":645,"content":2520},[2521],{"type":75,"attrs":2522,"content":2523},{"textAlign":19},[2524,2530],{"text":2525,"type":80,"marks":2526},"Risks and mitigations",[2527,2529],{"type":83,"attrs":2528},{"color":85},{"type":99},{"text":2531,"type":80,"marks":2532}," -- What could go wrong, and what's your plan? Example: Risk: \"User resistance to the new design.\" Mitigation: \"A/B test with a small user group before full rollout.\"",[2533],{"type":83,"attrs":2534},{"color":85},{"type":645,"content":2536},[2537],{"type":75,"attrs":2538,"content":2539},{"textAlign":19},[2540,2546],{"text":2541,"type":80,"marks":2542},"Constraints",[2543,2545],{"type":83,"attrs":2544},{"color":85},{"type":99},{"text":2547,"type":80,"marks":2548}," -- Hard limits like budget, compliance requirements (GDPR, accessibility standards), or technology restrictions.",[2549],{"type":83,"attrs":2550},{"color":85},{"type":645,"content":2552},[2553],{"type":75,"attrs":2554,"content":2555},{"textAlign":19},[2556,2562],{"text":2557,"type":80,"marks":2558},"Approvals",[2559,2561],{"type":83,"attrs":2560},{"color":85},{"type":99},{"text":2563,"type":80,"marks":2564}," -- List the stakeholders who need to sign off before work begins.",[2565],{"type":83,"attrs":2566},{"color":85},{"type":623,"attrs":2568},{"id":1283,"body":2569},[2570],{"_uid":2571,"margin":1153,"component":1154},"i-0d90444e-ec88-4096-952f-6747d338d33a",{"type":580,"attrs":2573,"content":2574},{"level":582,"textAlign":19},[2575],{"text":2576,"type":80,"marks":2577},"Product redesign scope VS product redesign brief: what's the difference?",[2578],{"type":83,"attrs":2579},{"color":85},{"type":75,"attrs":2581,"content":2582},{"textAlign":19},[2583],{"text":2584,"type":80,"marks":2585},"You'll often see the terms \"redesign scope\" and \"redesign brief\" used interchangeably. While they overlap significantly, there's a subtle distinction worth noting:",[2586],{"type":83,"attrs":2587},{"color":85},{"type":2283,"content":2589},[2590,2621,2657,2693,2729],{"type":2286,"content":2591},[2592,2597,2609],{"type":2289,"attrs":2593,"content":2594},{"colspan":2291,"rowspan":2291,"colwidth":19},[2595],{"type":75,"attrs":2596},{"textAlign":19},{"type":2289,"attrs":2598,"content":2599},{"colspan":2291,"rowspan":2291,"colwidth":19},[2600],{"type":75,"attrs":2601,"content":2602},{"textAlign":19},[2603],{"text":2604,"type":80,"marks":2605},"Product redesign scope",[2606,2608],{"type":83,"attrs":2607},{"color":85},{"type":99},{"type":2289,"attrs":2610,"content":2611},{"colspan":2291,"rowspan":2291,"colwidth":19},[2612],{"type":75,"attrs":2613,"content":2614},{"textAlign":19},[2615],{"text":2616,"type":80,"marks":2617},"Product redesign brief",[2618,2620],{"type":83,"attrs":2619},{"color":85},{"type":99},{"type":2286,"content":2622},[2623,2635,2646],{"type":2317,"attrs":2624,"content":2625},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2626],{"type":75,"attrs":2627,"content":2628},{"textAlign":19},[2629],{"text":2630,"type":80,"marks":2631},"Primary audience",[2632,2634],{"type":83,"attrs":2633},{"color":85},{"type":99},{"type":2317,"attrs":2636,"content":2637},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2638],{"type":75,"attrs":2639,"content":2640},{"textAlign":19},[2641],{"text":2642,"type":80,"marks":2643},"Project team and stakeholders",[2644],{"type":83,"attrs":2645},{"color":85},{"type":2317,"attrs":2647,"content":2648},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2649],{"type":75,"attrs":2650,"content":2651},{"textAlign":19},[2652],{"text":2653,"type":80,"marks":2654},"Design team (sometimes external agencies)",[2655],{"type":83,"attrs":2656},{"color":85},{"type":2286,"content":2658},[2659,2671,2682],{"type":2317,"attrs":2660,"content":2661},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2662],{"type":75,"attrs":2663,"content":2664},{"textAlign":19},[2665],{"text":2666,"type":80,"marks":2667},"Focus",[2668,2670],{"type":83,"attrs":2669},{"color":85},{"type":99},{"type":2317,"attrs":2672,"content":2673},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2674],{"type":75,"attrs":2675,"content":2676},{"textAlign":19},[2677],{"text":2678,"type":80,"marks":2679},"Boundaries, constraints, and success criteria",[2680],{"type":83,"attrs":2681},{"color":85},{"type":2317,"attrs":2683,"content":2684},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2685],{"type":75,"attrs":2686,"content":2687},{"textAlign":19},[2688],{"text":2689,"type":80,"marks":2690},"Creative direction, brand context, and design goals",[2691],{"type":83,"attrs":2692},{"color":85},{"type":2286,"content":2694},[2695,2707,2718],{"type":2317,"attrs":2696,"content":2697},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2698],{"type":75,"attrs":2699,"content":2700},{"textAlign":19},[2701],{"text":2702,"type":80,"marks":2703},"Includes",[2704,2706],{"type":83,"attrs":2705},{"color":85},{"type":99},{"type":2317,"attrs":2708,"content":2709},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2710],{"type":75,"attrs":2711,"content":2712},{"textAlign":19},[2713],{"text":2714,"type":80,"marks":2715},"In/out of scope, timeline, risks, KPIs",[2716],{"type":83,"attrs":2717},{"color":85},{"type":2317,"attrs":2719,"content":2720},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2721],{"type":75,"attrs":2722,"content":2723},{"textAlign":19},[2724],{"text":2725,"type":80,"marks":2726},"Target audience profiles, visual references, tone of voice",[2727],{"type":83,"attrs":2728},{"color":85},{"type":2286,"content":2730},[2731,2743,2754],{"type":2317,"attrs":2732,"content":2733},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2734],{"type":75,"attrs":2735,"content":2736},{"textAlign":19},[2737],{"text":2738,"type":80,"marks":2739},"Purpose",[2740,2742],{"type":83,"attrs":2741},{"color":85},{"type":99},{"type":2317,"attrs":2744,"content":2745},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2746],{"type":75,"attrs":2747,"content":2748},{"textAlign":19},[2749],{"text":2750,"type":80,"marks":2751},"Define what will and won't be done",[2752],{"type":83,"attrs":2753},{"color":85},{"type":2317,"attrs":2755,"content":2756},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[2757],{"type":75,"attrs":2758,"content":2759},{"textAlign":19},[2760],{"text":2761,"type":80,"marks":2762},"Inspire and guide the design direction",[2763],{"type":83,"attrs":2764},{"color":85},{"type":75,"attrs":2766,"content":2767},{"textAlign":19},[2768],{"text":2769,"type":80,"marks":2770},"In practice, many teams combine both into a single document. If you're working with an external design agency, you'll likely need a more detailed brief. If the redesign is handled in-house, a comprehensive scope document usually covers everything you need.",[2771],{"type":83,"attrs":2772},{"color":85},{"type":75,"attrs":2774,"content":2775},{"textAlign":19},[2776,2781,2790,2794,2803],{"text":2777,"type":80,"marks":2778},"For more on writing effective design briefs, ",[2779],{"type":83,"attrs":2780},{"color":85},{"text":2782,"type":80,"marks":2783},"Eleken's guide to creating a design brief",[2784,2787,2789],{"type":98,"attrs":2785},{"href":2786,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.eleken.co/blog-posts/design-brief-example-how-it-should-look-like-and-what-it-should-contain",{"type":83,"attrs":2788},{"color":1138},{"type":1141},{"text":2017,"type":80,"marks":2791},[2792],{"type":83,"attrs":2793},{"color":85},{"text":2795,"type":80,"marks":2796},"UXPin's design brief guide",[2797,2800,2802],{"type":98,"attrs":2798},{"href":2799,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.uxpin.com/studio/blog/design-brief/",{"type":83,"attrs":2801},{"color":1138},{"type":1141},{"text":2804,"type":80,"marks":2805}," are both excellent resources.",[2806],{"type":83,"attrs":2807},{"color":85},{"type":623,"attrs":2809},{"id":1283,"body":2810},[2811],{"_uid":2812,"margin":1153,"component":1154},"i-fe4fa7f7-4c01-4898-a1c0-b84216dac8b3",{"type":580,"attrs":2814,"content":2815},{"level":582,"textAlign":19},[2816],{"text":2817,"type":80,"marks":2818},"Free product redesign scope templates you can use today",[2819],{"type":83,"attrs":2820},{"color":85},{"type":75,"attrs":2822,"content":2823},{"textAlign":19},[2824],{"text":2825,"type":80,"marks":2826},"You don't have to start from scratch. Here are some of the best free templates available:",[2827],{"type":83,"attrs":2828},{"color":85},{"type":580,"attrs":2830,"content":2831},{"level":633,"textAlign":19},[2832],{"text":2833,"type":80,"marks":2834},"Figma",[2835],{"type":83,"attrs":2836},{"color":1445},{"type":642,"content":2838},[2839,2858,2877,2896],{"type":645,"content":2840},[2841],{"type":75,"attrs":2842,"content":2843},{"textAlign":19},[2844,2853],{"text":2845,"type":80,"marks":2846},"Project scope template",[2847,2850,2852],{"type":98,"attrs":2848},{"href":2849,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1106702594278618457/project-scope-template",{"type":83,"attrs":2851},{"color":1138},{"type":1141},{"text":2854,"type":80,"marks":2855}," -- A clean, visual template for defining project boundaries directly in Figma.",[2856],{"type":83,"attrs":2857},{"color":85},{"type":645,"content":2859},[2860],{"type":75,"attrs":2861,"content":2862},{"textAlign":19},[2863,2872],{"text":2864,"type":80,"marks":2865},"FigJam project scope example",[2866,2869,2871],{"type":98,"attrs":2867},{"href":2868,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/templates/project-scope-example/",{"type":83,"attrs":2870},{"color":1138},{"type":1141},{"text":2873,"type":80,"marks":2874}," -- A collaborative whiteboard-style template great for team workshops.",[2875],{"type":83,"attrs":2876},{"color":85},{"type":645,"content":2878},[2879],{"type":75,"attrs":2880,"content":2881},{"textAlign":19},[2882,2891],{"text":2883,"type":80,"marks":2884},"UX project scoping template",[2885,2888,2890],{"type":98,"attrs":2886},{"href":2887,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1324496750757762106/ux-project-scoping-template",{"type":83,"attrs":2889},{"color":1138},{"type":1141},{"text":2892,"type":80,"marks":2893}," -- Specifically designed for UX projects with sections for research, design, and testing.",[2894],{"type":83,"attrs":2895},{"color":85},{"type":645,"content":2897},[2898],{"type":75,"attrs":2899,"content":2900},{"textAlign":19},[2901,2910],{"text":2902,"type":80,"marks":2903},"UX project scope canvas",[2904,2907,2909],{"type":98,"attrs":2905},{"href":2906,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.figma.com/community/file/1227756915677842825/ux-project-scope-canvas-ux-playbook",{"type":83,"attrs":2908},{"color":1138},{"type":1141},{"text":2911,"type":80,"marks":2912}," -- A canvas-style template from the UX Playbook.",[2913],{"type":83,"attrs":2914},{"color":85},{"type":580,"attrs":2916,"content":2917},{"level":633,"textAlign":19},[2918],{"text":2919,"type":80,"marks":2920},"Miro",[2921],{"type":83,"attrs":2922},{"color":1445},{"type":642,"content":2924},[2925],{"type":645,"content":2926},[2927],{"type":75,"attrs":2928,"content":2929},{"textAlign":19},[2930,2938],{"text":2845,"type":80,"marks":2931},[2932,2935,2937],{"type":98,"attrs":2933},{"href":2934,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://miro.com/templates/project-scope/",{"type":83,"attrs":2936},{"color":1138},{"type":1141},{"text":2939,"type":80,"marks":2940}," -- A collaborative board template ideal for remote teams who want to build their scope document together in real time.",[2941],{"type":83,"attrs":2942},{"color":85},{"type":580,"attrs":2944,"content":2945},{"level":633,"textAlign":19},[2946],{"text":2947,"type":80,"marks":2948},"Notion",[2949],{"type":83,"attrs":2950},{"color":1445},{"type":642,"content":2952},[2953,2972],{"type":645,"content":2954},[2955],{"type":75,"attrs":2956,"content":2957},{"textAlign":19},[2958,2967],{"text":2959,"type":80,"marks":2960},"Design brief templates collection",[2961,2964,2966],{"type":98,"attrs":2962},{"href":2963,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.notion.com/templates/collections/top-10-design-brief-templates-for-product-development-managers",{"type":83,"attrs":2965},{"color":1138},{"type":1141},{"text":2968,"type":80,"marks":2969}," -- A curated collection of design brief templates for product development managers.",[2970],{"type":83,"attrs":2971},{"color":85},{"type":645,"content":2973},[2974],{"type":75,"attrs":2975,"content":2976},{"textAlign":19},[2977,2986],{"text":2978,"type":80,"marks":2979},"Project proposal template for designers",[2980,2983,2985],{"type":98,"attrs":2981},{"href":2982,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.notion.com/templates/projectproposal",{"type":83,"attrs":2984},{"color":1138},{"type":1141},{"text":2987,"type":80,"marks":2988}," -- A structured proposal template with sections that map well to redesign scoping.",[2989],{"type":83,"attrs":2990},{"color":85},{"type":580,"attrs":2992,"content":2993},{"level":633,"textAlign":19},[2994],{"text":2995,"type":80,"marks":2996},"Other tools",[2997],{"type":83,"attrs":2998},{"color":1445},{"type":642,"content":3000},[3001,3020,3039,3058],{"type":645,"content":3002},[3003],{"type":75,"attrs":3004,"content":3005},{"textAlign":19},[3006,3015],{"text":3007,"type":80,"marks":3008},"Project scope template for Word",[3009,3012,3014],{"type":98,"attrs":3010},{"href":3011,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.projectmanager.com/templates/project-scope-template",{"type":83,"attrs":3013},{"color":1138},{"type":1141},{"text":3016,"type":80,"marks":3017}," -- A traditional document-style template from ProjectManager, great for teams that prefer Word or Google Docs.",[3018],{"type":83,"attrs":3019},{"color":85},{"type":645,"content":3021},[3022],{"type":75,"attrs":3023,"content":3024},{"textAlign":19},[3025,3034],{"text":3026,"type":80,"marks":3027},"Project scope templates for Excel and Word",[3028,3031,3033],{"type":98,"attrs":3029},{"href":3030,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.smartsheet.com/content/project-scope-templates",{"type":83,"attrs":3032},{"color":1138},{"type":1141},{"text":3035,"type":80,"marks":3036}," -- Multiple formats from Smartsheet with varying levels of detail.",[3037],{"type":83,"attrs":3038},{"color":85},{"type":645,"content":3040},[3041],{"type":75,"attrs":3042,"content":3043},{"textAlign":19},[3044,3053],{"text":3045,"type":80,"marks":3046},"Website redesign scope of work template",[3047,3050,3052],{"type":98,"attrs":3048},{"href":3049,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.wethos.co/scope-of-work-templates/website-redesign",{"type":83,"attrs":3051},{"color":1138},{"type":1141},{"text":3054,"type":80,"marks":3055}," -- Specifically tailored to website redesign projects, from Wethos.",[3056],{"type":83,"attrs":3057},{"color":85},{"type":645,"content":3059},[3060],{"type":75,"attrs":3061,"content":3062},{"textAlign":19},[3063,3072],{"text":3064,"type":80,"marks":3065},"Product brief template",[3066,3069,3071],{"type":98,"attrs":3067},{"href":3068,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://asana.com/resources/product-brief-template",{"type":83,"attrs":3070},{"color":1138},{"type":1141},{"text":3073,"type":80,"marks":3074}," -- From Asana, focused on the product brief angle with built-in project management integration.",[3075],{"type":83,"attrs":3076},{"color":85},{"type":623,"attrs":3078},{"id":1283,"body":3079},[3080],{"_uid":3081,"margin":1153,"component":1154},"i-ed56f1a2-ed4f-4a7f-bbba-cb7cebb1c11e",{"type":580,"attrs":3083,"content":3084},{"level":582,"textAlign":19},[3085],{"text":3086,"type":80,"marks":3087},"Tips for writing a product redesign scope that actually works",[3088],{"type":83,"attrs":3089},{"color":85},{"type":580,"attrs":3091,"content":3092},{"level":633,"textAlign":19},[3093],{"text":3094,"type":80,"marks":3095},"Start with discovery, not solutions",[3096],{"type":83,"attrs":3097},{"color":1445},{"type":75,"attrs":3099,"content":3100},{"textAlign":19},[3101,3106,3114],{"text":3102,"type":80,"marks":3103},"It's tempting to jump straight into defining your redesigned UI. Resist that urge. As one ",[3104],{"type":83,"attrs":3105},{"color":85},{"text":3107,"type":80,"marks":3108},"experienced designer on Reddit",[3109,3111,3113],{"type":98,"attrs":3110},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3112},{"color":1138},{"type":1141},{"text":3115,"type":80,"marks":3116}," advises, \"Focus on UX discovery as the first order of business... Only once these questions are answered can you really start to develop any grounded visual, interaction, or information design concepts.\"",[3117],{"type":83,"attrs":3118},{"color":85},{"type":580,"attrs":3120,"content":3121},{"level":633,"textAlign":19},[3122],{"text":3123,"type":80,"marks":3124},"Don't build the design system first",[3125],{"type":83,"attrs":3126},{"color":1445},{"type":75,"attrs":3128,"content":3129},{"textAlign":19},[3130,3135,3143],{"text":3131,"type":80,"marks":3132},"When tackling a full redesign, teams often want to start by creating a comprehensive design system. This can be a trap. As ",[3133],{"type":83,"attrs":3134},{"color":85},{"text":3136,"type":80,"marks":3137},"another practitioner warns",[3138,3140,3142],{"type":98,"attrs":3139},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3141},{"color":1138},{"type":1141},{"text":3144,"type":80,"marks":3145},", \"One of the biggest mistakes people make is starting with a design system and then 3 months later there's a detailed system but no product. Build out a system as you work on core flows.\"",[3146],{"type":83,"attrs":3147},{"color":85},{"type":580,"attrs":3149,"content":3150},{"level":633,"textAlign":19},[3151],{"text":3152,"type":80,"marks":3153},"Prioritize key flows over comprehensive coverage",[3154],{"type":83,"attrs":3155},{"color":1445},{"type":75,"attrs":3157,"content":3158},{"textAlign":19},[3159,3164,3172],{"text":3160,"type":80,"marks":3161},"You can't redesign everything at once. Start with the flows that have the biggest impact on users and the business. A ",[3162],{"type":83,"attrs":3163},{"color":85},{"text":3165,"type":80,"marks":3166},"common approach",[3167,3169,3171],{"type":98,"attrs":3168},{"href":1551,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3170},{"color":1138},{"type":1141},{"text":3173,"type":80,"marks":3174}," is to \"target key pain points and important flows first to establish the baseline of your system, and then apply it more broadly.\"",[3175],{"type":83,"attrs":3176},{"color":85},{"type":580,"attrs":3178,"content":3179},{"level":633,"textAlign":19},[3180],{"text":3181,"type":80,"marks":3182},"Include a usability testing plan",[3183],{"type":83,"attrs":3184},{"color":1445},{"type":75,"attrs":3186,"content":3187},{"textAlign":19},[3188,3193,3201],{"text":3189,"type":80,"marks":3190},"Stakeholders will inevitably ask, \"How do you know this new design will work better?\" Pre-empt this by including a testing plan in your scope. As ",[3191],{"type":83,"attrs":3192},{"color":85},{"text":3194,"type":80,"marks":3195},"UXPlanet advises",[3196,3198,3200],{"type":98,"attrs":3197},{"href":1475,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3199},{"color":1138},{"type":1141},{"text":3202,"type":80,"marks":3203},", outline the usability testing methods you'll use, the metrics you'll measure, and how you'll incorporate feedback into iterative improvements.",[3204],{"type":83,"attrs":3205},{"color":85},{"type":580,"attrs":3207,"content":3208},{"level":633,"textAlign":19},[3209],{"text":3210,"type":80,"marks":3211},"Invest in stakeholder management",[3212],{"type":83,"attrs":3213},{"color":1445},{"type":75,"attrs":3215,"content":3216},{"textAlign":19},[3217],{"text":3218,"type":80,"marks":3219},"Don't underestimate the political dimension of redesign projects. Get buy-in early and often. Your scope document is one of the most powerful tools for this -- it shows stakeholders that you've thought through the problem, have a clear plan, and understand the constraints.",[3220],{"type":83,"attrs":3221},{"color":85},{"type":580,"attrs":3223,"content":3224},{"level":633,"textAlign":19},[3225],{"text":3226,"type":80,"marks":3227},"Write for your audience",[3228],{"type":83,"attrs":3229},{"color":1445},{"type":75,"attrs":3231,"content":3232},{"textAlign":19},[3233],{"text":3234,"type":80,"marks":3235},"If your scope document is going to executives, lead with business impact and keep design jargon to a minimum. If it's for your design and engineering team, get technical. The best scope documents are the ones people actually read.",[3236],{"type":83,"attrs":3237},{"color":85},{"type":623,"attrs":3239},{"id":1283,"body":3240},[3241],{"_uid":3242,"margin":1153,"component":1154},"i-56016b26-b093-460c-a97a-2edf2bdc778b",{"type":580,"attrs":3244,"content":3245},{"level":582,"textAlign":19},[3246],{"text":3247,"type":80,"marks":3248},"Key takeaways",[3249],{"type":83,"attrs":3250},{"color":85},{"type":642,"content":3252},[3253,3274,3295,3316,3337,3353,3374,3394,3441,3462],{"type":645,"content":3254},[3255],{"type":75,"attrs":3256,"content":3257},{"textAlign":19},[3258,3263,3269],{"text":3259,"type":80,"marks":3260},"A ",[3261],{"type":83,"attrs":3262},{"color":85},{"text":3264,"type":80,"marks":3265},"product redesign scope template",[3266,3268],{"type":83,"attrs":3267},{"color":85},{"type":99},{"text":3270,"type":80,"marks":3271}," defines the boundaries, goals, deliverables, and success metrics for a redesign project. It's the single most important document for keeping a redesign on track.",[3272],{"type":83,"attrs":3273},{"color":85},{"type":645,"content":3275},[3276],{"type":75,"attrs":3277,"content":3278},{"textAlign":19},[3279,3284,3290],{"text":3280,"type":80,"marks":3281},"Always include ",[3282],{"type":83,"attrs":3283},{"color":85},{"text":3285,"type":80,"marks":3286},"what's in scope and out of scope",[3287,3289],{"type":83,"attrs":3288},{"color":85},{"type":99},{"text":3291,"type":80,"marks":3292},". The out-of-scope list is your best defense against scope creep.",[3293],{"type":83,"attrs":3294},{"color":85},{"type":645,"content":3296},[3297],{"type":75,"attrs":3298,"content":3299},{"textAlign":19},[3300,3305,3311],{"text":3301,"type":80,"marks":3302},"Define ",[3303],{"type":83,"attrs":3304},{"color":85},{"text":3306,"type":80,"marks":3307},"measurable objectives",[3308,3310],{"type":83,"attrs":3309},{"color":85},{"type":99},{"text":3312,"type":80,"marks":3313}," using frameworks like SMART goals, OKRs, or Google's HEART framework. \"Make it better\" is not a goal.",[3314],{"type":83,"attrs":3315},{"color":85},{"type":645,"content":3317},[3318],{"type":75,"attrs":3319,"content":3320},{"textAlign":19},[3321,3326,3332],{"text":3322,"type":80,"marks":3323},"Include a ",[3324],{"type":83,"attrs":3325},{"color":85},{"text":3327,"type":80,"marks":3328},"current state analysis",[3329,3331],{"type":83,"attrs":3330},{"color":85},{"type":99},{"text":3333,"type":80,"marks":3334}," with UX audit findings, pain points, and competitive analysis to justify the redesign to stakeholders.",[3335],{"type":83,"attrs":3336},{"color":85},{"type":645,"content":3338},[3339],{"type":75,"attrs":3340,"content":3341},{"textAlign":19},[3342,3348],{"text":3343,"type":80,"marks":3344},"Start with discovery",[3345,3347],{"type":83,"attrs":3346},{"color":85},{"type":99},{"text":3349,"type":80,"marks":3350}," before defining solutions. Understand user needs and pain points before designing new interfaces.",[3351],{"type":83,"attrs":3352},{"color":85},{"type":645,"content":3354},[3355],{"type":75,"attrs":3356,"content":3357},{"textAlign":19},[3358,3363,3369],{"text":3359,"type":80,"marks":3360},"Use ",[3361],{"type":83,"attrs":3362},{"color":85},{"text":3364,"type":80,"marks":3365},"high-fidelity mockups",[3366,3368],{"type":83,"attrs":3367},{"color":85},{"type":99},{"text":3370,"type":80,"marks":3371}," rather than wireframes when presenting proposed solutions to stakeholders.",[3372],{"type":83,"attrs":3373},{"color":85},{"type":645,"content":3375},[3376],{"type":75,"attrs":3377,"content":3378},{"textAlign":19},[3379,3383,3389],{"text":3322,"type":80,"marks":3380},[3381],{"type":83,"attrs":3382},{"color":85},{"text":3384,"type":80,"marks":3385},"usability testing plan",[3386,3388],{"type":83,"attrs":3387},{"color":85},{"type":99},{"text":3390,"type":80,"marks":3391}," to demonstrate that your new design will be validated before launch.",[3392],{"type":83,"attrs":3393},{"color":85},{"type":645,"content":3395},[3396],{"type":75,"attrs":3397,"content":3398},{"textAlign":19},[3399,3404,3412,3417,3424,3429,3436],{"text":3400,"type":80,"marks":3401},"Don't start from scratch, use a ",[3402],{"type":83,"attrs":3403},{"color":85},{"text":3405,"type":80,"marks":3406},"free template from Figma",[3407,3409,3411],{"type":98,"attrs":3408},{"href":2868,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3410},{"color":1138},{"type":1141},{"text":3413,"type":80,"marks":3414},", ",[3415],{"type":83,"attrs":3416},{"color":85},{"text":2919,"type":80,"marks":3418},[3419,3421,3423],{"type":98,"attrs":3420},{"href":2934,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3422},{"color":1138},{"type":1141},{"text":3425,"type":80,"marks":3426},", or ",[3427],{"type":83,"attrs":3428},{"color":85},{"text":2947,"type":80,"marks":3430},[3431,3433,3435],{"type":98,"attrs":3432},{"href":2963,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3434},{"color":1138},{"type":1141},{"text":3437,"type":80,"marks":3438}," and customize it to fit your project.",[3439],{"type":83,"attrs":3440},{"color":85},{"type":645,"content":3442},[3443],{"type":75,"attrs":3444,"content":3445},{"textAlign":19},[3446,3451,3457],{"text":3447,"type":80,"marks":3448},"Invest in ",[3449],{"type":83,"attrs":3450},{"color":85},{"text":3452,"type":80,"marks":3453},"stakeholder management",[3454,3456],{"type":83,"attrs":3455},{"color":85},{"type":99},{"text":3458,"type":80,"marks":3459}," from day one. Redesign projects can be politically complex, and a solid scope document builds trust and alignment.",[3460],{"type":83,"attrs":3461},{"color":85},{"type":645,"content":3463},[3464],{"type":75,"attrs":3465,"content":3466},{"textAlign":19},[3467],{"text":3468,"type":80,"marks":3469},"The difference between a successful redesign and a chaotic one often comes down to how well the project was scoped before a single pixel was pushed.",[3470],{"type":83,"attrs":3471},{"color":85},[386,1158,392,3473,3474],"276e7fcf-9b3c-402b-a895-61a2953d21ef","568e096f-e9b3-4e09-8c25-6c0ea6a7248c",{"type":72,"content":3476},[3477],{"type":75},[3479],{"_uid":3480,"component":521,"imageLink":3481,"imageAltText":1214,"mobileImageLink":3482,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"a6998a76-18dc-40c3-b7d4-0bf198fcbd11",{"id":92,"url":1213,"linktype":507,"fieldtype":95,"cached_url":1213},{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"product-redesign-scope-document-templates-and-examples","blog/product-redesign-scope-document-templates-and-examples",-7320,[],"fce902e0-78b4-431a-b27e-b69c76ada860",[],{"name":3491,"created_at":3492,"published_at":3493,"updated_at":3494,"id":3495,"uuid":3496,"content":3497,"slug":5282,"full_slug":5283,"sort_by_date":19,"position":5284,"tag_list":5285,"is_startpage":22,"parent_id":1195,"meta_data":19,"group_id":5286,"first_published_at":5287,"release_id":19,"lang":26,"path":19,"alternates":5288,"default_full_slug":19,"translated_slugs":19},"Technical Debt in HealthTech: How to Identify, Prioritize, and Resolve It for Accelerated Growth","2026-04-09T13:19:01.184Z","2026-04-10T10:55:50.115Z","2026-04-10T10:55:50.157Z",164049474330798,"467705ed-351c-4092-8a5d-cc7e2074bcc7",{"seo":3498,"_uid":3504,"title":3491,"Subtitle":3505,"authorId":3506,"postBody":3507,"component":1156,"categoryIds":5265,"postSummary":5268,"featuredImage":5275,"secondAuthorId":92,"pressDescription":92,"replaceRelatedPosts":5281},[3499],{"_uid":3500,"image":3501,"title":3502,"noIndex":22,"component":569,"description":3503,"canonicalUrl":92},"c1d4201b-c61f-4b4b-9dc6-78475bbdf901",[],"Technical Debt in HealthTech: How to Identify, Prioritize, and Resolve It for Accelerated Growth | Monterail blog","Manage technical debt in HealthTech before it becomes a legal or financial liability. Learn to identify, prioritize, and resolve debt for scalable, compliant growth.","3c92fb84-dfa0-4a0e-99e4-297d39882966",[],"fa0cb701-255f-4077-a658-bc83fa894e25",[3508,5239],{"_uid":3509,"content":3510,"component":1155},"6bd3a560-82b7-4f36-8bfd-b9cc05e442da",{"type":72,"content":3511},[3512,3520,3542,3544,3582,3590,3598,3613,3615,3624,3641,3673,3681,3690,3732,3768,3776,3785,3833,3841,3863,3872,3898,3926,3966,3974,3983,3991,3999,4007,4016,4024,4046,4054,4056,4061,4070,4089,4101,4259,4261,4266,4274,4306,4308,4316,4324,4332,4341,4349,4357,4365,4374,4382,4390,4398,4407,4415,4447,4455,4464,4472,4504,4535,4537,4542,4550,4558,4579,4587,4595,4603,4611,4619,4627,4635,4643,4651,4673,4681,4690,4698,4706,4711,4713,4721,4729,4737,4745,4753,4761,4769,4777,4809,4817,4825,4976,4978,4983,4991,4999,5007,5015,5017,5022,5030,5038,5046,5054,5062,5070,5078,5086,5094,5102,5124,5126,5186,5194,5202,5210,5218,5226,5234],{"type":75,"attrs":3513,"content":3514},{"textAlign":19},[3515],{"text":3516,"type":80,"marks":3517},"\"Move fast and break things\" wasn't just a Facebook slogan. It was the operating model of an entire generation of tech companies. And for a while, it worked. Breaking things meant breaking markets, breaking incumbents, breaking records. The collateral damage (messy codebases, brittle architectures, security gaps) felt like a fair trade for speed.",[3518],{"type":83,"attrs":3519},{"color":85},{"type":75,"attrs":3521,"content":3522},{"textAlign":19},[3523,3528,3537],{"text":3524,"type":80,"marks":3525},"But in health tech, there was never a grace period to begin with. The shortcuts that buy a SaaS startup six months of runway can buy a health tech startup an OCR audit, a failed Series A, or something far worse. The ",[3526],{"type":83,"attrs":3527},{"color":85},{"text":3529,"type":80,"marks":3530},"real costs of building healthcare software",[3531,3534,3536],{"type":98,"attrs":3532},{"href":3533,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/healthcare-app-development-cost",{"type":83,"attrs":3535},{"color":1138},{"type":1141},{"text":3538,"type":80,"marks":3539}," reflect this complexity from day one.",[3540],{"type":83,"attrs":3541},{"color":85},{"type":75,"attrs":3543},{"textAlign":19},{"type":623,"attrs":3545},{"id":3546,"body":3547},"97534003-f450-44f2-9b7d-6e362e7866db",[3548],{"_uid":3549,"quote":3550,"fontSize":3580,"component":710,"accentColor":3581},"i-5bf236cb-4531-4680-bc4d-fd1544e2fa5a",{"type":72,"content":3551},[3552],{"type":75,"attrs":3553,"content":3554},{"textAlign":19},[3555,3560,3567,3575],{"text":3556,"type":80,"marks":3557},"The UK's",[3558],{"type":83,"attrs":3559},{"color":85},{"text":1124,"type":80,"marks":3561},[3562,3565],{"type":98,"attrs":3563},{"href":3564,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.pslhub.org/blogs/entry/6517-it-failures-causing-patient-deaths-says-nhs-safety-body/",{"type":83,"attrs":3566},{"color":85},{"text":3568,"type":80,"marks":3569},"Health Services Safety Investigations Body (HSSIB)",[3570,3572,3574],{"type":98,"attrs":3571},{"href":3564,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3573},{"color":1138},{"type":1141},{"text":3576,"type":80,"marks":3577}," stated in 2023 that IT failures are actively causing patient deaths",[3578],{"type":83,"attrs":3579},{"color":85},"text-18 md:text-20","green",{"type":75,"attrs":3583,"content":3584},{"textAlign":19},[3585],{"text":3586,"type":80,"marks":3587},"And yet the same founder instincts survive the move into healthcare. \"We'll fix it after launch.\" \"It's just an MVP.\" \"We can refactor once we get funding.\" Most founders mean it, and almost none follow through. By the time the funding lands, there's a product to ship, a customer to onboard, and a roadmap that somehow got longer overnight. The debt stays. It just quietly starts charging interest.",[3588],{"type":83,"attrs":3589},{"color":85},{"type":75,"attrs":3591,"content":3592},{"textAlign":19},[3593],{"text":3594,"type":80,"marks":3595},"This isn't a post about code quality. It's about what happens when the shortcuts you took at month three show up uninvited at your Series A, or in a compliance audit.",[3596],{"type":83,"attrs":3597},{"color":85},{"type":865,"content":3599},[3600],{"type":75,"attrs":3601,"content":3602},{"textAlign":19},[3603,3608,3610,3611],{"text":1231,"type":80,"marks":3604},[3605,3607],{"type":83,"attrs":3606},{"color":85},{"type":99},{"type":3609},"hard_break",{"type":3609},{"text":3612,"type":80},"Health tech founders should treat technical debt as a compliance and business risk, not just a code quality problem. The safest path is incremental modernization using the Strangler Fig pattern, replacing the highest-risk modules (audit trails, PHI handling, EHR integrations) first, while keeping the system live and using a Now/Next/Later prioritization framework tied to fundraising and compliance milestones.\"",{"type":75,"attrs":3614},{"textAlign":19},{"type":580,"attrs":3616,"content":3617},{"level":582,"textAlign":19},[3618],{"text":3619,"type":80,"marks":3620},"What Is Technical Debt, and What Does It Look Like in Health Tech?",[3621,3623],{"type":83,"attrs":3622},{"color":85},{"type":99},{"type":75,"attrs":3625,"content":3626},{"textAlign":19},[3627,3636],{"text":3628,"type":80,"marks":3629},"Technical debt",[3630,3633,3635],{"type":98,"attrs":3631},{"href":3632,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/legacy-systems-and-technical-debt-guide-to-modernization",{"type":83,"attrs":3634},{"color":1138},{"type":1141},{"text":3637,"type":80,"marks":3638}," is any shortcut taken during development that makes future changes more expensive or harder to make, in a health tech product, that might look like:",[3639],{"type":83,"attrs":3640},{"color":85},{"type":642,"content":3642},[3643,3653,3663],{"type":645,"content":3644},[3645],{"type":75,"attrs":3646,"content":3647},{"textAlign":19},[3648],{"text":3649,"type":80,"marks":3650},"Patient data written directly to a database with no audit trail. Fast to build, a HIPAA violation waiting to happen.",[3651],{"type":83,"attrs":3652},{"color":85},{"type":645,"content":3654},[3655],{"type":75,"attrs":3656,"content":3657},{"textAlign":19},[3658],{"text":3659,"type":80,"marks":3660},"A point-to-point HL7 integration with one hospital's EHR. Fine for your first customer, a scalability nightmare by your fifth.",[3661],{"type":83,"attrs":3662},{"color":85},{"type":645,"content":3664},[3665],{"type":75,"attrs":3666,"content":3667},{"textAlign":19},[3668],{"text":3669,"type":80,"marks":3670},"Authentication logic copied across services instead of centralized, until a penetration test finds three different entry points.",[3671],{"type":83,"attrs":3672},{"color":85},{"type":75,"attrs":3674,"content":3675},{"textAlign":19},[3676],{"text":3677,"type":80,"marks":3678},"And these aren't hypothetical issues. They're the patterns that show up in technical due diligence, in breach investigations, and in FDA audits.",[3679],{"type":83,"attrs":3680},{"color":85},{"type":580,"attrs":3682,"content":3683},{"level":633,"textAlign":19},[3684],{"text":3685,"type":80,"marks":3686},"How Does Regulatory Pressure Turn Tech Debt into Legal Debt?",[3687,3689],{"type":83,"attrs":3688},{"color":85},{"type":99},{"type":75,"attrs":3691,"content":3692},{"textAlign":19},[3693,3698,3705,3713,3718,3727],{"text":3694,"type":80,"marks":3695},"In most industries, technical debt slows your team down. In health tech, it also creates active legal exposure because every deferred compliance requirement is a liability that accumulates in the background. HIPAA doesn't grade on a curve. Missing audit logs, unencrypted patient data, weak access controls: understanding",[3696],{"type":83,"attrs":3697},{"color":85},{"text":1124,"type":80,"marks":3699},[3700,3703],{"type":98,"attrs":3701},{"href":3702,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/data-privacy-in-healthcare",{"type":83,"attrs":3704},{"color":85},{"text":3706,"type":80,"marks":3707},"healthcare data privacy requirements",[3708,3710,3712],{"type":98,"attrs":3709},{"href":3702,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3711},{"color":1138},{"type":1141},{"text":3714,"type":80,"marks":3715}," is table stakes, and each gap is a potential violation, with ",[3716],{"type":83,"attrs":3717},{"color":85},{"text":3719,"type":80,"marks":3720},"penalties",[3721,3724,3726],{"type":98,"attrs":3722},{"href":3723,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.hipaaguide.net/2024-penalties-for-hipaa-violations/",{"type":83,"attrs":3725},{"color":1138},{"type":1141},{"text":3728,"type":80,"marks":3729}," ranging from $141 to $2.1 million per violation category per year.",[3730],{"type":83,"attrs":3731},{"color":85},{"type":75,"attrs":3733,"content":3734},{"textAlign":19},[3735,3740,3749,3754,3763],{"text":3736,"type":80,"marks":3737},"For European founders, the pressure is even stronger. The ",[3738],{"type":83,"attrs":3739},{"color":85},{"text":3741,"type":80,"marks":3742},"European Health Data Space",[3743,3746,3748],{"type":98,"attrs":3744},{"href":3745,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://health.ec.europa.eu/ehealth-digital-health-and-care/european-health-data-space-regulation-ehds_en",{"type":83,"attrs":3747},{"color":1138},{"type":1141},{"text":3750,"type":80,"marks":3751}," (EHDS) regulation ",[3752],{"type":83,"attrs":3753},{"color":85},{"text":3755,"type":80,"marks":3756},"entered into force",[3757,3760,3762],{"type":98,"attrs":3758},{"href":3759,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.kennedyslaw.com/en/thought-leadership/article/2026/the-european-health-data-space-is-in-force-implications-for-healthcare-medtech-and-life-sciences/",{"type":83,"attrs":3761},{"color":1138},{"type":1141},{"text":3764,"type":80,"marks":3765}," in March 2025, establishing mandatory interoperability and security standards for EHR vendors and digital health companies, with full enforcement rolling out from 2027 through 2029. It doesn't replace GDPR; it stacks on top of it, alongside the AI Act, MDR, and NIS2.",[3766],{"type":83,"attrs":3767},{"color":85},{"type":75,"attrs":3769,"content":3770},{"textAlign":19},[3771],{"text":3772,"type":80,"marks":3773},"The pattern is consistent: the longer compliance is deferred, the more it costs.",[3774],{"type":83,"attrs":3775},{"color":85},{"type":580,"attrs":3777,"content":3778},{"level":633,"textAlign":19},[3779],{"text":3780,"type":80,"marks":3781},"Why Does Integration Complexity in Health Tech Have No Equivalent Elsewhere?",[3782,3784],{"type":83,"attrs":3783},{"color":85},{"type":99},{"type":75,"attrs":3786,"content":3787},{"textAlign":19},[3788,3793,3800,3808,3813,3820,3828],{"text":3789,"type":80,"marks":3790},"A typical hospital operates across",[3791],{"type":83,"attrs":3792},{"color":85},{"text":1124,"type":80,"marks":3794},[3795,3798],{"type":98,"attrs":3796},{"href":3797,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://kodjin.com/blog/fhir-vs-hl7-key-differences-and-which-is-a-better-choice/",{"type":83,"attrs":3799},{"color":85},{"text":3801,"type":80,"marks":3802},"15–20 separate software platforms",[3803,3805,3807],{"type":98,"attrs":3804},{"href":3797,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3806},{"color":1138},{"type":1141},{"text":3809,"type":80,"marks":3810},": EHRs, lab systems, pharmacy platforms, payer networks, and patient engagement tools. Each speaks a slightly different dialect of",[3811],{"type":83,"attrs":3812},{"color":85},{"text":1124,"type":80,"marks":3814},[3815,3818],{"type":98,"attrs":3816},{"href":3817,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://rhapsody.health/blog/fhir-vs-hl7-explained/",{"type":83,"attrs":3819},{"color":85},{"text":3821,"type":80,"marks":3822},"HL7 or FHIR",[3823,3825,3827],{"type":98,"attrs":3824},{"href":3817,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3826},{"color":1138},{"type":1141},{"text":3829,"type":80,"marks":3830},", the standards that govern how healthcare data is structured and exchanged. No two hospital implementations are identical, even when they run the same EHR vendor.",[3831],{"type":83,"attrs":3832},{"color":85},{"type":75,"attrs":3834,"content":3835},{"textAlign":19},[3836],{"text":3837,"type":80,"marks":3838},"Startups that wire their product directly to each customer's EHR, one point-to-point interface per hospital, don't just accumulate technical debt. They build a business model that gets more expensive with every new customer, as each new hospital requires a new custom integration. And here's what makes it a commercial problem, not just a technical one: that integration burden is shared.",[3839],{"type":83,"attrs":3840},{"color":85},{"type":75,"attrs":3842,"content":3843},{"textAlign":19},[3844,3849,3858],{"text":3845,"type":80,"marks":3846},"Hospitals running non-interoperable ",[3847],{"type":83,"attrs":3848},{"color":85},{"text":3850,"type":80,"marks":3851},"legacy systems",[3852,3855,3857],{"type":98,"attrs":3853},{"href":3854,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://techbullion.com/legacy-software-modernization-for-healthcare-compliance-security-and-roi/",{"type":83,"attrs":3856},{"color":1138},{"type":1141},{"text":3859,"type":80,"marks":3860}," spend $1.5–2.3 million annually on custom data integration work. When your architecture requires bespoke wiring on their end too, you become part of that cost.",[3861],{"type":83,"attrs":3862},{"color":85},{"type":580,"attrs":3864,"content":3865},{"level":633,"textAlign":19},[3866],{"text":3867,"type":80,"marks":3868},"What Are the Data Sensitivity, Security, and Patient Safety Risks?",[3869,3871],{"type":83,"attrs":3870},{"color":85},{"type":99},{"type":75,"attrs":3873,"content":3874},{"textAlign":19},[3875,3880,3884,3893],{"text":3876,"type":80,"marks":3877},"Healthcare has been the most expensive industry for data breaches for the",[3878],{"type":83,"attrs":3879},{"color":85},{"text":1124,"type":80,"marks":3881},[3882],{"type":83,"attrs":3883},{"color":1138},{"text":3885,"type":80,"marks":3886},"14th consecutive year",[3887,3890,3892],{"type":98,"attrs":3888},{"href":3889,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://newsroom.ibm.com/2024-07-30-ibm-report-escalating-data-breach-disruption-pushes-costs-to-new-highs",{"type":83,"attrs":3891},{"color":1138},{"type":1141},{"text":3894,"type":80,"marks":3895},", averaging $9.77 million per incident, more than double any other sector. But the cost is almost a distraction from the bigger issue: technical debt creates direct, documented pathways to patient harm.",[3896],{"type":83,"attrs":3897},{"color":85},{"type":75,"attrs":3899,"content":3900},{"textAlign":19},[3901,3906,3913,3921],{"text":3902,"type":80,"marks":3903},"The",[3904],{"type":83,"attrs":3905},{"color":85},{"text":1124,"type":80,"marks":3907},[3908,3911],{"type":98,"attrs":3909},{"href":3910,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.nixonpeabody.com/insights/articles/2024/03/05/the-change-healthcare-cybersecurity-breach",{"type":83,"attrs":3912},{"color":85},{"text":3914,"type":80,"marks":3915},"Change Healthcare attack of 2024",[3916,3918,3920],{"type":98,"attrs":3917},{"href":3910,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":3919},{"color":1138},{"type":1141},{"text":3922,"type":80,"marks":3923}," proves the point. No MFA on a legacy remote access portal. Systems dating back 40 years. 74% of US hospitals impacted. $100 million in daily provider losses. $22 million ransom paid. The technical debt was the vulnerability. The cyberattack was just the trigger.",[3924],{"type":83,"attrs":3925},{"color":85},{"type":75,"attrs":3927,"content":3928},{"textAlign":19},[3929,3934,3943,3948,3952,3961],{"text":3930,"type":80,"marks":3931},"And the liability doesn't work like it does in SaaS. The DOJ's",[3932],{"type":83,"attrs":3933},{"color":85},{"text":3935,"type":80,"marks":3936}," Civil Cyber-Fraud Initiative",[3937,3940,3942],{"type":98,"attrs":3938},{"href":3939,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.skadden.com/insights/publications/2023/11/the-nucleus",{"type":83,"attrs":3941},{"color":1138},{"type":1141},{"text":3944,"type":80,"marks":3945}," means insecure architecture can now trigger federal prosecution under the False Claims Act.",[3946],{"type":83,"attrs":3947},{"color":85},{"text":1124,"type":80,"marks":3949},[3950],{"type":83,"attrs":3951},{"color":1138},{"text":3953,"type":80,"marks":3954},"Practice Fusion paid $145 million",[3955,3958,3960],{"type":98,"attrs":3956},{"href":3957,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.justice.gov/archives/opa/pr/electronic-health-records-vendor-pay-145-million-resolve-criminal-and-civil-investigations-0",{"type":83,"attrs":3959},{"color":1138},{"type":1141},{"text":3962,"type":80,"marks":3963}," and entered a criminal deferred prosecution agreement.",[3964],{"type":83,"attrs":3965},{"color":85},{"type":75,"attrs":3967,"content":3968},{"textAlign":19},[3969],{"text":3970,"type":80,"marks":3971},"That's the liability ceiling in this industry, and no PR strategy gets you out from under it.",[3972],{"type":83,"attrs":3973},{"color":85},{"type":580,"attrs":3975,"content":3976},{"level":633,"textAlign":19},[3977],{"text":3978,"type":80,"marks":3979},"Why Do Founders Underestimate Scaling Under Compliance?",[3980,3982],{"type":83,"attrs":3981},{"color":85},{"type":99},{"type":75,"attrs":3984,"content":3985},{"textAlign":19},[3986],{"text":3987,"type":80,"marks":3988},"In most startup categories, scaling is primarily an engineering challenge. In health tech, it's an engineering challenge wrapped in a compliance obligation at every layer.",[3989],{"type":83,"attrs":3990},{"color":85},{"type":75,"attrs":3992,"content":3993},{"textAlign":19},[3994],{"text":3995,"type":80,"marks":3996},"You can't take the system down to fix it. A minute of downtime in a mid-sized hospital costs up to $7,500 in operational losses alone, and that's before the clinical consequences. Healthcare applications serving active workflows must maintain near-total uptime, which means every architectural intervention has to happen while the system is live. There are no maintenance windows. No \"we'll roll it back if it breaks.\" Every refactor, every migration, every infrastructure change has to be planned for zero disruption.",[3997],{"type":83,"attrs":3998},{"color":85},{"type":75,"attrs":4000,"content":4001},{"textAlign":19},[4002],{"text":4003,"type":80,"marks":4004},"This is why accumulating MVP technical debt makes architectural work so difficult to address later. The problems aren't harder to fix. The window for fixing them safely is much smaller.",[4005],{"type":83,"attrs":4006},{"color":85},{"type":580,"attrs":4008,"content":4009},{"level":633,"textAlign":19},[4010],{"text":4011,"type":80,"marks":4012},"How Does Technical Debt Become a Fundraising Red Flag?",[4013,4015],{"type":83,"attrs":4014},{"color":85},{"type":99},{"type":75,"attrs":4017,"content":4018},{"textAlign":19},[4019],{"text":4020,"type":80,"marks":4021},"Investors never care about the code. What they're actually assessing is whether the software can handle 10x growth without a replatform, and whether the team running it can be trusted to get there. A codebase where knowledge is concentrated in one developer, deployments are manual, and nobody has documented the architecture, isn't a technical problem in their eyes. It's a leadership and operational risk signal.",[4022],{"type":83,"attrs":4023},{"color":85},{"type":75,"attrs":4025,"content":4026},{"textAlign":19},[4027,4032,4041],{"text":4028,"type":80,"marks":4029},"In health tech, that scrutiny gets a second layer. Healthcare investors now routinely probe these areas during ",[4030],{"type":83,"attrs":4031},{"color":85},{"text":4033,"type":80,"marks":4034},"acquisition due diligence",[4035,4038,4040],{"type":98,"attrs":4036},{"href":4037,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://clinxacademy.com/blog/acquisition-due-diligence-checklist",{"type":83,"attrs":4039},{"color":1138},{"type":1141},{"text":4042,"type":80,"marks":4043},": FHIR version support and migration path, PHI handling architecture, audit log infrastructure, and active compliance posture. Weak answers in these areas directly affect operations, regulatory standing, and enterprise trust.",[4044],{"type":83,"attrs":4045},{"color":85},{"type":75,"attrs":4047,"content":4048},{"textAlign":19},[4049],{"text":4050,"type":80,"marks":4051},"A gap in any one of them doesn't just invite a valuation haircut. It raises the question of whether the product can be sold to hospitals at all.",[4052],{"type":83,"attrs":4053},{"color":85},{"type":75,"attrs":4055},{"textAlign":19},{"type":623,"attrs":4057},{"id":3546,"body":4058},[4059],{"_uid":4060,"margin":1153,"component":1154},"i-7ff5a1c5-8664-47a2-86ef-d311755d2722",{"type":580,"attrs":4062,"content":4063},{"level":582,"textAlign":19},[4064],{"text":4065,"type":80,"marks":4066},"What Are the Hidden Costs of Technical Debt: Growth, Funding, and Compliance Risks?",[4067,4069],{"type":83,"attrs":4068},{"color":85},{"type":99},{"type":75,"attrs":4071,"content":4072},{"textAlign":19},[4073,4078,4084],{"text":4074,"type":80,"marks":4075},"The previous section showed ",[4076],{"type":83,"attrs":4077},{"color":85},{"text":4079,"type":80,"marks":4080},"why",[4081,4083],{"type":83,"attrs":4082},{"color":85},{"type":614},{"text":4085,"type":80,"marks":4086}," health tech is structurally different. This one answers a more practical question: what does unmanaged technical debt actually cost you, and where does it show up first?",[4087],{"type":83,"attrs":4088},{"color":85},{"type":75,"attrs":4090,"content":4091},{"textAlign":19},[4092,4097,4098,4099],{"text":4093,"type":80,"marks":4094},"It shows up in three areas that founders consistently underestimate until it's too late. And the dangerous part is they don't stay separate.",[4095],{"type":83,"attrs":4096},{"color":85},{"type":3609},{"type":3609},{"text":4100,"type":80},"Technical debt shows up in three distinct business areas, each with compounding consequences:",{"type":2283,"content":4102},[4103,4145,4183,4221],{"type":2286,"content":4104},[4105,4118,4132],{"type":2317,"attrs":4106,"content":4107},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4108],{"type":75,"attrs":4109,"content":4111},{"textAlign":4110},"center",[4112],{"text":4113,"type":80,"marks":4114},"Risk area",[4115,4117],{"type":83,"attrs":4116},{"color":85},{"type":99},{"type":2317,"attrs":4119,"content":4122},{"colspan":2291,"rowspan":2291,"colwidth":4120,"backgroundColor":19},[4121],264,[4123],{"type":75,"attrs":4124,"content":4125},{"textAlign":4110},[4126],{"text":4127,"type":80,"marks":4128},"How technical debt shows up",[4129,4131],{"type":83,"attrs":4130},{"color":85},{"type":99},{"type":2317,"attrs":4133,"content":4135},{"colspan":2291,"rowspan":2291,"colwidth":4134,"backgroundColor":19},[4121],[4136],{"type":75,"attrs":4137,"content":4138},{"textAlign":4110},[4139],{"text":4140,"type":80,"marks":4141},"The real-world consequence",[4142,4144],{"type":83,"attrs":4143},{"color":85},{"type":99},{"type":2286,"content":4146},[4147,4159,4171],{"type":2317,"attrs":4148,"content":4149},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4150],{"type":75,"attrs":4151,"content":4152},{"textAlign":19},[4153],{"text":4154,"type":80,"marks":4155},"Growth",[4156,4158],{"type":83,"attrs":4157},{"color":85},{"type":99},{"type":2317,"attrs":4160,"content":4162},{"colspan":2291,"rowspan":2291,"colwidth":4161,"backgroundColor":19},[4121],[4163],{"type":75,"attrs":4164,"content":4165},{"textAlign":19},[4166],{"text":4167,"type":80,"marks":4168},"Features take longer to build. Engineers spend more time firefighting fragile integrations than shipping new functionality. Each new hospital customer requires a bespoke integration instead of a configuration.",[4169],{"type":83,"attrs":4170},{"color":85},{"type":2317,"attrs":4172,"content":4174},{"colspan":2291,"rowspan":2291,"colwidth":4173,"backgroundColor":19},[4121],[4175],{"type":75,"attrs":4176,"content":4177},{"textAlign":19},[4178],{"text":4179,"type":80,"marks":4180},"Competitors move faster. Enterprise deals stall. The roadmap slips because the codebase is fighting every change.",[4181],{"type":83,"attrs":4182},{"color":85},{"type":2286,"content":4184},[4185,4197,4209],{"type":2317,"attrs":4186,"content":4187},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4188],{"type":75,"attrs":4189,"content":4190},{"textAlign":19},[4191],{"text":4192,"type":80,"marks":4193},"Funding",[4194,4196],{"type":83,"attrs":4195},{"color":85},{"type":99},{"type":2317,"attrs":4198,"content":4200},{"colspan":2291,"rowspan":2291,"colwidth":4199,"backgroundColor":19},[4121],[4201],{"type":75,"attrs":4202,"content":4203},{"textAlign":19},[4204],{"text":4205,"type":80,"marks":4206},"Investors find undocumented architecture, no CI/CD pipeline, knowledge concentrated in one developer, missing audit logs, and no FHIR migration path.",[4207],{"type":83,"attrs":4208},{"color":85},{"type":2317,"attrs":4210,"content":4212},{"colspan":2291,"rowspan":2291,"colwidth":4211,"backgroundColor":19},[4121],[4213],{"type":75,"attrs":4214,"content":4215},{"textAlign":19},[4216],{"text":4217,"type":80,"marks":4218},"In health tech, deals get killed. Compliance gaps raise questions about whether the product can be sold to hospitals at all.",[4219],{"type":83,"attrs":4220},{"color":85},{"type":2286,"content":4222},[4223,4235,4247],{"type":2317,"attrs":4224,"content":4225},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4226],{"type":75,"attrs":4227,"content":4228},{"textAlign":19},[4229],{"text":4230,"type":80,"marks":4231},"Compliance",[4232,4234],{"type":83,"attrs":4233},{"color":85},{"type":99},{"type":2317,"attrs":4236,"content":4238},{"colspan":2291,"rowspan":2291,"colwidth":4237,"backgroundColor":19},[4121],[4239],{"type":75,"attrs":4240,"content":4241},{"textAlign":19},[4242],{"text":4243,"type":80,"marks":4244},"Security vulnerabilities accumulate in deferred encryption, missing MFA, and unaudited PHI access paths. Audit trails don't exist or can't be queried on demand.",[4245],{"type":83,"attrs":4246},{"color":85},{"type":2317,"attrs":4248,"content":4250},{"colspan":2291,"rowspan":2291,"colwidth":4249,"backgroundColor":19},[4121],[4251],{"type":75,"attrs":4252,"content":4253},{"textAlign":19},[4254],{"text":4255,"type":80,"marks":4256},"Without audit infrastructure in place, you can't prove compliance even when you believe you're compliant, and regulators won't take your word for it.",[4257],{"type":83,"attrs":4258},{"color":85},{"type":75,"attrs":4260},{"textAlign":19},{"type":623,"attrs":4262},{"id":3546,"body":4263},[4264],{"_uid":4265,"margin":1153,"component":1154},"i-1a1aadf8-3f7d-4922-b7ce-8d7bb0e16440",{"type":75,"attrs":4267,"content":4268},{"textAlign":19},[4269],{"text":4270,"type":80,"marks":4271},"A compliance gap slows enterprise sales, delaying the revenue needed to fund the compliance fix you need before your Series A. A growth bottleneck delays the architectural work investors expect to see. ",[4272],{"type":83,"attrs":4273},{"color":85},{"type":623,"attrs":4275},{"id":3546,"body":4276},[4277],{"_uid":4278,"quote":4279,"fontSize":3580,"component":710,"accentColor":3581},"i-5f066d07-12a7-40fc-818a-7a1c858063e5",{"type":72,"content":4280},[4281,4289],{"type":75,"attrs":4282,"content":4283},{"textAlign":19},[4284],{"text":4285,"type":80,"marks":4286},"The average cost of a healthcare data breach reached $9.77 million in 2024, making it the most expensive industry for breaches for the 14th consecutive year. That figure is the real cost of deferred technical debt - not a hypothetical risk, but a documented outcome.",[4287],{"type":83,"attrs":4288},{"color":85},{"type":75,"attrs":4290,"content":4292},{"textAlign":4291},"right",[4293,4301],{"text":4294,"type":80,"marks":4295},"IBM's Cost of a Data Breach Report 2024",[4296,4298,4300],{"type":98,"attrs":4297},{"href":3889,"uuid":19,"anchor":19,"target":19,"linktype":94},{"type":83,"attrs":4299},{"color":1138},{"type":1141},{"text":4302,"type":80,"marks":4303},", ",[4304],{"type":83,"attrs":4305},{"color":85},{"type":75,"attrs":4307},{"textAlign":4291},{"type":580,"attrs":4309,"content":4310},{"level":582,"textAlign":19},[4311],{"text":4312,"type":80,"marks":4313},"How to Identify Technical Debt in Your Health Tech Product",[4314],{"type":83,"attrs":4315},{"color":85},{"type":75,"attrs":4317,"content":4318},{"textAlign":19},[4319],{"text":4320,"type":80,"marks":4321},"Technical debt in healthcare software doesn't look like messy code. It shows up as missed deadlines, risky releases, and systems that are harder to scale than they should be.",[4322],{"type":83,"attrs":4323},{"color":85},{"type":75,"attrs":4325,"content":4326},{"textAlign":19},[4327],{"text":4328,"type":80,"marks":4329},"And by the time most health tech founders recognize it, technical debt is already slowing product development, increasing costs, and putting compliance at risk.",[4330],{"type":83,"attrs":4331},{"color":85},{"type":580,"attrs":4333,"content":4334},{"level":633,"textAlign":19},[4335],{"text":4336,"type":80,"marks":4337},"Is your product getting harder to ship?",[4338,4340],{"type":83,"attrs":4339},{"color":85},{"type":99},{"type":75,"attrs":4342,"content":4343},{"textAlign":19},[4344],{"text":4345,"type":80,"marks":4346},"Features that once took a week now take a month. Releases feel unpredictable. Small changes break unrelated parts of the system.",[4347],{"type":83,"attrs":4348},{"color":85},{"type":75,"attrs":4350,"content":4351},{"textAlign":19},[4352],{"text":4353,"type":80,"marks":4354},"This isn't just growing complexity. It's accumulated technical debt in your software architecture.",[4355],{"type":83,"attrs":4356},{"color":85},{"type":75,"attrs":4358,"content":4359},{"textAlign":19},[4360],{"text":4361,"type":80,"marks":4362},"Your engineering team isn't slower. Your system is inefficient.",[4363],{"type":83,"attrs":4364},{"color":85},{"type":580,"attrs":4366,"content":4367},{"level":633,"textAlign":19},[4368],{"text":4369,"type":80,"marks":4370},"Is your engineering team stuck maintaining instead of building?",[4371,4373],{"type":83,"attrs":4372},{"color":85},{"type":99},{"type":75,"attrs":4375,"content":4376},{"textAlign":19},[4377],{"text":4378,"type":80,"marks":4379},"If most of your engineering time goes into bug fixing, maintenance, and firefighting instead of building new features, you're dealing with technical debt.",[4380],{"type":83,"attrs":4381},{"color":85},{"type":75,"attrs":4383,"content":4384},{"textAlign":19},[4385],{"text":4386,"type":80,"marks":4387},"New developers take too long to onboard because system knowledge isn't documented. Instead, it lives in silos.",[4388],{"type":83,"attrs":4389},{"color":85},{"type":75,"attrs":4391,"content":4392},{"textAlign":19},[4393],{"text":4394,"type":80,"marks":4395},"This is one of the most common technical debt examples in health tech: undocumented systems that don't scale with the team.",[4396],{"type":83,"attrs":4397},{"color":85},{"type":580,"attrs":4399,"content":4400},{"level":633,"textAlign":19},[4401],{"text":4402,"type":80,"marks":4403},"How Does Technical Debt Impact Health Tech Scalability?",[4404,4406],{"type":83,"attrs":4405},{"color":85},{"type":99},{"type":75,"attrs":4408,"content":4409},{"textAlign":19},[4410],{"text":4411,"type":80,"marks":4412},"Fragile healthcare software architecture becomes visible when it limits growth:",[4413],{"type":83,"attrs":4414},{"color":85},{"type":642,"content":4416},[4417,4427,4437],{"type":645,"content":4418},[4419],{"type":75,"attrs":4420,"content":4421},{"textAlign":19},[4422],{"text":4423,"type":80,"marks":4424},"Every new hospital or clinic requires custom integrations",[4425],{"type":83,"attrs":4426},{"color":85},{"type":645,"content":4428},[4429],{"type":75,"attrs":4430,"content":4431},{"textAlign":19},[4432],{"text":4433,"type":80,"marks":4434},"Adding features creates regressions in other parts of the system",[4435],{"type":83,"attrs":4436},{"color":85},{"type":645,"content":4438},[4439],{"type":75,"attrs":4440,"content":4441},{"textAlign":19},[4442],{"text":4443,"type":80,"marks":4444},"You lack clear visibility into how patient data flows",[4445],{"type":83,"attrs":4446},{"color":85},{"type":75,"attrs":4448,"content":4449},{"textAlign":19},[4450],{"text":4451,"type":80,"marks":4452},"In healthcare software development, this is more than inefficiency. It's a compliance and security risk.",[4453],{"type":83,"attrs":4454},{"color":85},{"type":580,"attrs":4456,"content":4457},{"level":633,"textAlign":19},[4458],{"text":4459,"type":80,"marks":4460},"What does your team's language reveal about hidden technical debt?",[4461,4463],{"type":83,"attrs":4462},{"color":85},{"type":99},{"type":75,"attrs":4465,"content":4466},{"textAlign":19},[4467],{"text":4468,"type":80,"marks":4469},"Pay attention to how your team talks about the codebase:",[4470],{"type":83,"attrs":4471},{"color":85},{"type":642,"content":4473},[4474,4484,4494],{"type":645,"content":4475},[4476],{"type":75,"attrs":4477,"content":4478},{"textAlign":19},[4479],{"text":4480,"type":80,"marks":4481},"\"Only one person understands this part\"",[4482],{"type":83,"attrs":4483},{"color":85},{"type":645,"content":4485},[4486],{"type":75,"attrs":4487,"content":4488},{"textAlign":19},[4489],{"text":4490,"type":80,"marks":4491},"\"We'll fix it after the next funding round\"",[4492],{"type":83,"attrs":4493},{"color":85},{"type":645,"content":4495},[4496],{"type":75,"attrs":4497,"content":4498},{"textAlign":19},[4499],{"text":4500,"type":80,"marks":4501},"\"It works for now\"",[4502],{"type":83,"attrs":4503},{"color":85},{"type":75,"attrs":4505,"content":4506},{"textAlign":19},[4507,4512,4516,4525,4530],{"text":4508,"type":80,"marks":4509},"These are classic technical debt signals. They indicate a lack of ownership, documentation, and long-term planning. Getting the",[4510],{"type":83,"attrs":4511},{"color":85},{"text":1124,"type":80,"marks":4513},[4514],{"type":83,"attrs":4515},{"color":1138},{"text":4517,"type":80,"marks":4518},"essential aspects of healthcare software architecture",[4519,4522,4524],{"type":98,"attrs":4520},{"href":4521,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/successful-healthcare-app-development",{"type":83,"attrs":4523},{"color":1138},{"type":1141},{"text":1124,"type":80,"marks":4526},[4527,4529],{"type":83,"attrs":4528},{"color":1138},{"type":1141},{"text":4531,"type":80,"marks":4532},"right from the start prevents most of them.",[4533],{"type":83,"attrs":4534},{"color":85},{"type":75,"attrs":4536},{"textAlign":19},{"type":623,"attrs":4538},{"id":3546,"body":4539},[4540],{"_uid":4541,"margin":1153,"component":1154},"i-c5adaddd-4722-4bf0-8891-afa7a68c77a4",{"type":580,"attrs":4543,"content":4544},{"level":582,"textAlign":19},[4545],{"text":4546,"type":80,"marks":4547},"The Founder's Decision: Rewrite or Refactor?",[4548],{"type":83,"attrs":4549},{"color":85},{"type":75,"attrs":4551,"content":4552},{"textAlign":19},[4553],{"text":4554,"type":80,"marks":4555},"When technical debt becomes impossible to ignore, most founders jump to the same conclusion: we need to rewrite everything. It's almost always the wrong call, and in health tech, where you can't take the system offline and your compliance posture is under constant scrutiny, it's even riskier than in other industries.",[4556],{"type":83,"attrs":4557},{"color":85},{"type":75,"attrs":4559,"content":4560},{"textAlign":19},[4561,4565,4574],{"text":1466,"type":80,"marks":4562},[4563],{"type":83,"attrs":4564},{"color":85},{"text":4566,"type":80,"marks":4567},"Increment's engineering experts",[4568,4571,4573],{"type":98,"attrs":4569},{"href":4570,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://increment.com/software-architecture/ask-an-expert-upgrade-outdated-codebase/",{"type":83,"attrs":4572},{"color":1138},{"type":1141},{"text":4575,"type":80,"marks":4576}," put it, total rewrites are time-consuming, costly, and carry a specific danger that's easy to underestimate: you may end up with a product that's unfit for release for months or years, with nothing to show investors or customers in the meantime.",[4577],{"type":83,"attrs":4578},{"color":85},{"type":75,"attrs":4580,"content":4581},{"textAlign":19},[4582],{"text":4583,"type":80,"marks":4584},"So before you make the call, here's how to think about it.",[4585],{"type":83,"attrs":4586},{"color":85},{"type":580,"attrs":4588,"content":4589},{"level":633,"textAlign":19},[4590],{"text":4591,"type":80,"marks":4592},"When you should not rewrite",[4593],{"type":83,"attrs":4594},{"color":85},{"type":75,"attrs":4596,"content":4597},{"textAlign":19},[4598],{"text":4599,"type":80,"marks":4600},"If your product has early traction, limited runway, or debt that isn't blocking growth or compliance, a rewrite will cost you more than it solves. You'd be trading months of engineering time, with no customer-facing output, for an improvement a more targeted approach could achieve at a fraction of the cost.",[4601],{"type":83,"attrs":4602},{"color":85},{"type":75,"attrs":4604,"content":4605},{"textAlign":19},[4606],{"text":4607,"type":80,"marks":4608},"If the system works well enough to sell and operate, and the debt sits in specific modules rather than the core architecture, you don't need to start over. You need to be more deliberate about where you invest.",[4609],{"type":83,"attrs":4610},{"color":85},{"type":580,"attrs":4612,"content":4613},{"level":633,"textAlign":19},[4614],{"text":4615,"type":80,"marks":4616},"When a rewrite might be necessary",[4617],{"type":83,"attrs":4618},{"color":85},{"type":75,"attrs":4620,"content":4621},{"textAlign":19},[4622],{"text":4623,"type":80,"marks":4624},"There are situations where patching isn't enough. A rewrite becomes worth considering when the core data model is fundamentally incompatible with compliance requirements. For example, PHI scattered across the system with no centralized, auditable handling, where retrofitting would require touching everything anyway. Or when the technology stack is genuinely end-of-life with no active security support, making HIPAA compliance structurally impossible without starting fresh.",[4625],{"type":83,"attrs":4626},{"color":85},{"type":75,"attrs":4628,"content":4629},{"textAlign":19},[4630],{"text":4631,"type":80,"marks":4632},"These cases are rarer than founders think. But when they apply, continuing to patch is more expensive and more dangerous than rebuilding.",[4633],{"type":83,"attrs":4634},{"color":85},{"type":580,"attrs":4636,"content":4637},{"level":633,"textAlign":19},[4638],{"text":4639,"type":80,"marks":4640},"The hybrid approach ",[4641],{"type":83,"attrs":4642},{"color":85},{"type":75,"attrs":4644,"content":4645},{"textAlign":19},[4646],{"text":4647,"type":80,"marks":4648},"The most practical path for most health tech startups is neither a full rewrite nor patching indefinitely. It's incremental modernization through selective legacy code reuse: replacing the most problematic parts of the system while keeping everything else running.",[4649],{"type":83,"attrs":4650},{"color":85},{"type":75,"attrs":4652,"content":4653},{"textAlign":19},[4654,4659,4668],{"text":4655,"type":80,"marks":4656},"The most proven method for this is the ",[4657],{"type":83,"attrs":4658},{"color":85},{"text":4660,"type":80,"marks":4661},"Strangler Fig pattern",[4662,4665,4667],{"type":98,"attrs":4663},{"href":4664,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://martinfowler.com/bliki/StranglerFigApplication.html",{"type":83,"attrs":4666},{"color":1138},{"type":1141},{"text":4669,"type":80,"marks":4670},", coined by Martin Fowler. Rather than replacing the system all at once, you place a modern layer in front of the legacy architecture and gradually migrate functionality behind it, one module at a time, validated in production before the next one begins.",[4671],{"type":83,"attrs":4672},{"color":85},{"type":75,"attrs":4674,"content":4675},{"textAlign":19},[4676],{"text":4677,"type":80,"marks":4678},"In health tech, this typically means building a FHIR-compliant API layer in front of your existing EHR integrations first, improving interoperability and building a robust health tech compliance architecture without touching the rest of the product, then progressively migrating PHI handling and audit infrastructure into clean, isolated modules.",[4679],{"type":83,"attrs":4680},{"color":85},{"type":580,"attrs":4682,"content":4683},{"level":633,"textAlign":19},[4684],{"text":4685,"type":80,"marks":4686},"Legacy code reuse, refactor, or rewrite? ",[4687,4689],{"type":83,"attrs":4688},{"color":85},{"type":99},{"type":75,"attrs":4691,"content":4692},{"textAlign":19},[4693],{"text":4694,"type":80,"marks":4695},"Not sure where to start?  Use this decision tree.",[4696],{"type":83,"attrs":4697},{"color":85},{"type":75,"attrs":4699,"content":4700},{"textAlign":19},[4701],{"type":718,"attrs":4702},{"id":4703,"alt":92,"src":4704,"title":92,"source":92,"copyright":92,"meta_data":4705},164344511303807,"https://a.storyblok.com/f/202591/2816x1536/17a8cf0e2e/decision-tree.jpg",{},{"type":623,"attrs":4707},{"id":3546,"body":4708},[4709],{"_uid":4710,"margin":1153,"component":1154},"i-b4e975e6-14cf-4eec-8e6a-feaa1537841a",{"type":75,"attrs":4712},{"textAlign":19},{"type":580,"attrs":4714,"content":4715},{"level":582,"textAlign":19},[4716],{"text":4717,"type":80,"marks":4718},"A Practical Framework to Prioritize Technical Debt (Without Slowing Down)",[4719],{"type":83,"attrs":4720},{"color":85},{"type":75,"attrs":4722,"content":4723},{"textAlign":19},[4724],{"text":4725,"type":80,"marks":4726},"You've identified the debt. You know it's slowing you down. The question now is: where do you start?",[4727],{"type":83,"attrs":4728},{"color":85},{"type":75,"attrs":4730,"content":4731},{"textAlign":19},[4732],{"text":4733,"type":80,"marks":4734},"The instinct is usually to tackle the most visible problem first, the integration that keeps breaking, the module everyone avoids touching. But visible isn't the same as critical. In health tech, the most dangerous debt is often the quietest: the audit trail that was never built, the PHI handling that was never centralized, the compliance gap that won't surface until a hospital procurement team asks for documentation you don't have.",[4735],{"type":83,"attrs":4736},{"color":85},{"type":75,"attrs":4738,"content":4739},{"textAlign":19},[4740],{"text":4741,"type":80,"marks":4742},"To effectively reduce technical debt, startup founders need a prioritization framework that solves a specific problem: it stops debt reduction from being reactive, triggered by crises, and makes it predictable, budgeted, and tied to business outcomes. Here's how to build one in four steps.",[4743],{"type":83,"attrs":4744},{"color":85},{"type":580,"attrs":4746,"content":4747},{"level":633,"textAlign":19},[4748],{"text":4749,"type":80,"marks":4750},"1. Classify debt: critical vs non-critical",[4751],{"type":83,"attrs":4752},{"color":1445},{"type":75,"attrs":4754,"content":4755},{"textAlign":19},[4756],{"text":4757,"type":80,"marks":4758},"Start by separating debt that is actively blocking something from debt that is just untidy. Critical debt slows feature delivery, creates compliance exposure, or will surface during investor due diligence. Non-critical debt is cosmetic: messy code, outdated dependencies, missing documentation that doesn't yet affect your ability to operate or grow.",[4759],{"type":83,"attrs":4760},{"color":85},{"type":580,"attrs":4762,"content":4763},{"level":633,"textAlign":19},[4764],{"text":4765,"type":80,"marks":4766},"2. Map debt to business risk",[4767],{"type":83,"attrs":4768},{"color":1445},{"type":75,"attrs":4770,"content":4771},{"textAlign":19},[4772],{"text":4773,"type":80,"marks":4774},"Once classified, rank critical debt by the type of risk it creates.",[4775],{"type":83,"attrs":4776},{"color":85},{"type":642,"content":4778},[4779,4789,4799],{"type":645,"content":4780},[4781],{"type":75,"attrs":4782,"content":4783},{"textAlign":19},[4784],{"text":4785,"type":80,"marks":4786},"Compliance risk comes first. A missing audit trail or unencrypted PHI path is a potential HIPAA violation accumulating daily.",[4787],{"type":83,"attrs":4788},{"color":85},{"type":645,"content":4790},[4791],{"type":75,"attrs":4792,"content":4793},{"textAlign":19},[4794],{"text":4795,"type":80,"marks":4796},"Revenue risk comes second. Debt that is slowing down enterprise onboarding or blocking a key integration is directly costing you deals.",[4797],{"type":83,"attrs":4798},{"color":85},{"type":645,"content":4800},[4801],{"type":75,"attrs":4802,"content":4803},{"textAlign":19},[4804],{"text":4805,"type":80,"marks":4806},"Funding risk comes third. Architecture gaps that will surface in Series A due diligence need to be addressed before the process starts, not during it.",[4807],{"type":83,"attrs":4808},{"color":85},{"type":580,"attrs":4810,"content":4811},{"level":633,"textAlign":19},[4812],{"text":4813,"type":80,"marks":4814},"3. Use the Now / Next / Later model",[4815],{"type":83,"attrs":4816},{"color":1445},{"type":75,"attrs":4818,"content":4819},{"textAlign":19},[4820],{"text":4821,"type":80,"marks":4822},"With debt ranked by risk, assign each item to a time horizon:",[4823],{"type":83,"attrs":4824},{"color":85},{"type":2283,"content":4826},[4827,4862,4900,4938],{"type":2286,"content":4828},[4829,4834,4848],{"type":2317,"attrs":4830,"content":4831},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4832],{"type":75,"attrs":4833},{"textAlign":19},{"type":2317,"attrs":4835,"content":4838},{"colspan":2291,"rowspan":2291,"colwidth":4836,"backgroundColor":19},[4837],306,[4839],{"type":75,"attrs":4840,"content":4841},{"textAlign":4110},[4842],{"text":4843,"type":80,"marks":4844},"What belongs here",[4845,4847],{"type":83,"attrs":4846},{"color":85},{"type":99},{"type":2317,"attrs":4849,"content":4852},{"colspan":2291,"rowspan":2291,"colwidth":4850,"backgroundColor":19},[4851],281,[4853],{"type":75,"attrs":4854,"content":4855},{"textAlign":4110},[4856],{"text":4857,"type":80,"marks":4858},"Example",[4859,4861],{"type":83,"attrs":4860},{"color":85},{"type":99},{"type":2286,"content":4863},[4864,4876,4888],{"type":2317,"attrs":4865,"content":4866},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4867],{"type":75,"attrs":4868,"content":4869},{"textAlign":19},[4870],{"text":4871,"type":80,"marks":4872},"Now",[4873,4875],{"type":83,"attrs":4874},{"color":85},{"type":99},{"type":2317,"attrs":4877,"content":4879},{"colspan":2291,"rowspan":2291,"colwidth":4878,"backgroundColor":19},[4837],[4880],{"type":75,"attrs":4881,"content":4882},{"textAlign":19},[4883],{"text":4884,"type":80,"marks":4885},"Anything creating active compliance exposure or blocking a current sprint goal",[4886],{"type":83,"attrs":4887},{"color":85},{"type":2317,"attrs":4889,"content":4891},{"colspan":2291,"rowspan":2291,"colwidth":4890,"backgroundColor":19},[4851],[4892],{"type":75,"attrs":4893,"content":4894},{"textAlign":19},[4895],{"text":4896,"type":80,"marks":4897},"Missing audit logs before a hospital procurement review",[4898],{"type":83,"attrs":4899},{"color":85},{"type":2286,"content":4901},[4902,4914,4926],{"type":2317,"attrs":4903,"content":4904},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4905],{"type":75,"attrs":4906,"content":4907},{"textAlign":19},[4908],{"text":4909,"type":80,"marks":4910},"Next",[4911,4913],{"type":83,"attrs":4912},{"color":85},{"type":99},{"type":2317,"attrs":4915,"content":4917},{"colspan":2291,"rowspan":2291,"colwidth":4916,"backgroundColor":19},[4837],[4918],{"type":75,"attrs":4919,"content":4920},{"textAlign":19},[4921],{"text":4922,"type":80,"marks":4923},"Debt in modules where your next product milestone depends on clean architecture",[4924],{"type":83,"attrs":4925},{"color":85},{"type":2317,"attrs":4927,"content":4929},{"colspan":2291,"rowspan":2291,"colwidth":4928,"backgroundColor":19},[4851],[4930],{"type":75,"attrs":4931,"content":4932},{"textAlign":19},[4933],{"text":4934,"type":80,"marks":4935},"EHR integration layer before onboarding your next enterprise customer",[4936],{"type":83,"attrs":4937},{"color":85},{"type":2286,"content":4939},[4940,4952,4964],{"type":2317,"attrs":4941,"content":4942},{"colspan":2291,"rowspan":2291,"colwidth":19,"backgroundColor":19},[4943],{"type":75,"attrs":4944,"content":4945},{"textAlign":19},[4946],{"text":4947,"type":80,"marks":4948},"Later",[4949,4951],{"type":83,"attrs":4950},{"color":85},{"type":99},{"type":2317,"attrs":4953,"content":4955},{"colspan":2291,"rowspan":2291,"colwidth":4954,"backgroundColor":19},[4837],[4956],{"type":75,"attrs":4957,"content":4958},{"textAlign":19},[4959],{"text":4960,"type":80,"marks":4961},"Cosmetic or low-impact debt with no near-term consequence",[4962],{"type":83,"attrs":4963},{"color":85},{"type":2317,"attrs":4965,"content":4967},{"colspan":2291,"rowspan":2291,"colwidth":4966,"backgroundColor":19},[4851],[4968],{"type":75,"attrs":4969,"content":4970},{"textAlign":19},[4971],{"text":4972,"type":80,"marks":4973},"Outdated internal tooling, minor code inconsistencies",[4974],{"type":83,"attrs":4975},{"color":85},{"type":75,"attrs":4977},{"textAlign":19},{"type":623,"attrs":4979},{"id":3546,"body":4980},[4981],{"_uid":4982,"margin":1153,"component":1154},"i-a84b50f7-f7ec-44d5-b0cf-ff49fda67f91",{"type":580,"attrs":4984,"content":4985},{"level":633,"textAlign":19},[4986],{"text":4987,"type":80,"marks":4988},"4. Align with your product roadmap",[4989],{"type":83,"attrs":4990},{"color":1445},{"type":75,"attrs":4992,"content":4993},{"textAlign":19},[4994],{"text":4995,"type":80,"marks":4996},"The final step is the most important: fix debt where your growth depends on it. If your next enterprise customer requires a bidirectional integration, the architecture layer is your highest-priority debt, regardless of its rank on a technical complexity scale.",[4997],{"type":83,"attrs":4998},{"color":85},{"type":75,"attrs":5000,"content":5001},{"textAlign":19},[5002],{"text":5003,"type":80,"marks":5004},"If your Series A is six months away, audit log infrastructure and CI/CD pipeline are priorities one and two.",[5005],{"type":83,"attrs":5006},{"color":85},{"type":75,"attrs":5008,"content":5009},{"textAlign":19},[5010],{"text":5011,"type":80,"marks":5012},"Debt reduction should always be traceable to a product or business outcome. If you can't explain why a piece of debt matters to your roadmap, it belongs in \"Later.\"",[5013],{"type":83,"attrs":5014},{"color":85},{"type":75,"attrs":5016},{"textAlign":19},{"type":623,"attrs":5018},{"id":3546,"body":5019},[5020],{"_uid":5021,"margin":1153,"component":1154},"i-795dd8db-684d-45b6-be9a-6222c4c19fb8",{"type":580,"attrs":5023,"content":5024},{"level":582,"textAlign":19},[5025],{"text":5026,"type":80,"marks":5027},"How to Resolve Technical Debt Without Killing Velocity",[5028],{"type":83,"attrs":5029},{"color":85},{"type":75,"attrs":5031,"content":5032},{"textAlign":19},[5033],{"text":5034,"type":80,"marks":5035},"Addressing technical debt doesn't have to mean slowing down. The teams that do it well treat improvement as a parallel track, not a pause.",[5036],{"type":83,"attrs":5037},{"color":85},{"type":580,"attrs":5039,"content":5040},{"level":633,"textAlign":19},[5041],{"text":5042,"type":80,"marks":5043},"Build a parallel improvement track",[5044],{"type":83,"attrs":5045},{"color":85},{"type":75,"attrs":5047,"content":5048},{"textAlign":19},[5049],{"text":5050,"type":80,"marks":5051},"The most common mistake is treating debt reduction as a separate project that competes with feature development. It's not. It's a fixed allocation within normal sprints. Dedicate a protected percentage of engineering capacity every sprint to debt, and make it non-negotiable. When debt reduction is scheduled alongside features rather than instead of them, it gets done consistently without the drama of a \"debt sprint\" that never arrives.",[5052],{"type":83,"attrs":5053},{"color":85},{"type":580,"attrs":5055,"content":5056},{"level":633,"textAlign":19},[5057],{"text":5058,"type":80,"marks":5059},"Introduce scalable architecture gradually",[5060],{"type":83,"attrs":5061},{"color":85},{"type":75,"attrs":5063,"content":5064},{"textAlign":19},[5065],{"text":5066,"type":80,"marks":5067},"You don't need to redesign your entire system to improve it. Start by decoupling the components where growth is most constrained, typically your EHR integration layer and PHI handling modules. Introduce a compliant API layer in front of legacy integrations. Move toward modular services incrementally. Each improvement compounds: a cleaner integration layer makes the next hospital onboarding faster, which makes the next one faster still.",[5068],{"type":83,"attrs":5069},{"color":85},{"type":580,"attrs":5071,"content":5072},{"level":633,"textAlign":19},[5073],{"text":5074,"type":80,"marks":5075},"Invest in testing and observability",[5076],{"type":83,"attrs":5077},{"color":85},{"type":75,"attrs":5079,"content":5080},{"textAlign":19},[5081],{"text":5082,"type":80,"marks":5083},"Automated testing on compliance-critical paths catches regressions before they become incidents. Structured logging and alerting give you visibility into how the system actually behaves under load. These aren't nice-to-haves; they're the infrastructure that prevents new debt from forming as fast as you pay down the old.",[5084],{"type":83,"attrs":5085},{"color":85},{"type":580,"attrs":5087,"content":5088},{"level":633,"textAlign":19},[5089],{"text":5090,"type":80,"marks":5091},"Bring in external expertise when needed",[5092],{"type":83,"attrs":5093},{"color":85},{"type":75,"attrs":5095,"content":5096},{"textAlign":19},[5097],{"text":5098,"type":80,"marks":5099},"Sometimes the gap between your current architecture and where you need to be is too large to close with your existing team, either because the knowledge doesn't exist internally or because hiring takes longer than the problem allows. Healthcare-specific technical debt is more complex than general-purpose debt precisely because of the regulatory overlay: a generalist engineer cannot assess HIPAA compliance gaps without domain experience.",[5100],{"type":83,"attrs":5101},{"color":85},{"type":75,"attrs":5103,"content":5104},{"textAlign":19},[5105,5110,5119],{"text":5106,"type":80,"marks":5107},"External expertise, whether a fractional CTO, a specialist consultancy, or a healthcare-focused engineering partner, can compress timelines significantly and de-risk the process in ways that internal hiring cannot match on a startup timeline. The lessons from ",[5108],{"type":83,"attrs":5109},{"color":85},{"text":5111,"type":80,"marks":5112},"scaling healthcare startups",[5113,5116,5118],{"type":98,"attrs":5114},{"href":5115,"uuid":19,"anchor":19,"target":19,"linktype":94},"https://www.monterail.com/blog/scaling-from-startup-to-enterprise",{"type":83,"attrs":5117},{"color":1138},{"type":1141},{"text":5120,"type":80,"marks":5121}," into enterprise-grade products show how targeted external support accelerates this transition.",[5122],{"type":83,"attrs":5123},{"color":85},{"type":580,"attrs":5125},{"level":582,"textAlign":19},{"type":623,"attrs":5127},{"id":3546,"body":5128},[5129],{"_uid":5130,"quote":5131,"fontSize":5184,"component":710,"accentColor":5185},"i-534b69f0-1fe5-41c8-8e08-1b058ce5fa02",{"type":72,"content":5132},[5133,5142],{"type":75,"attrs":5134,"content":5135},{"textAlign":19},[5136],{"text":5137,"type":80,"marks":5138},"Key Takeaways",[5139,5141],{"type":83,"attrs":5140},{"color":85},{"type":99},{"type":642,"content":5143},[5144,5154,5164,5174],{"type":645,"content":5145},[5146],{"type":75,"attrs":5147,"content":5148},{"textAlign":19},[5149],{"text":5150,"type":80,"marks":5151},"In health tech, technical debt creates legal and regulatory exposure that doesn't exist in other startup categories. Deferred compliance isn't just inefficient; it's potentially criminal.",[5152],{"type":83,"attrs":5153},{"color":85},{"type":645,"content":5155},[5156],{"type":75,"attrs":5157,"content":5158},{"textAlign":19},[5159],{"text":5160,"type":80,"marks":5161},"The most dangerous debt is often the quietest: missing audit trails, unencrypted PHI paths, and point-to-point EHR integrations that multiply with every new customer.",[5162],{"type":83,"attrs":5163},{"color":85},{"type":645,"content":5165},[5166],{"type":75,"attrs":5167,"content":5168},{"textAlign":19},[5169],{"text":5170,"type":80,"marks":5171},"A full rewrite is almost never the answer. Incremental modernization using the Strangler Fig pattern lets you improve the system without taking it offline or stalling the roadmap.",[5172],{"type":83,"attrs":5173},{"color":85},{"type":645,"content":5175},[5176],{"type":75,"attrs":5177,"content":5178},{"textAlign":19},[5179],{"text":5180,"type":80,"marks":5181},"Technical debt is a business variable, not a technical one. The founders who scale successfully are the ones who manage it deliberately, continuously, and before it forces the issue.",[5182],{"type":83,"attrs":5183},{"color":85},"text-20 md:text-22","red",{"type":580,"attrs":5187,"content":5188},{"level":582,"textAlign":19},[5189],{"text":5190,"type":80,"marks":5191},"Technical Debt Is a Strategic Decision, Not a Technical One",[5192],{"type":83,"attrs":5193},{"color":85},{"type":75,"attrs":5195,"content":5196},{"textAlign":19},[5197],{"text":5198,"type":80,"marks":5199},"Remember the slogan we started with? \"Move fast and break things.\" In healthcare, the things you break can be patient records, compliance certifications, enterprise deals, and funding rounds. The speed you gain in month three can cost you the company in year two.",[5200],{"type":83,"attrs":5201},{"color":85},{"type":75,"attrs":5203,"content":5204},{"textAlign":19},[5205],{"text":5206,"type":80,"marks":5207},"But this isn't an argument for moving slowly. It's an argument for moving deliberately.",[5208],{"type":83,"attrs":5209},{"color":85},{"type":75,"attrs":5211,"content":5212},{"textAlign":19},[5213],{"text":5214,"type":80,"marks":5215},"The founders who manage this well don't rewrite everything or ignore everything. They build a framework for deciding what matters now, what can wait, and what will quietly become existential if left unaddressed. They treat compliance as a prerequisite for growth, not a constraint on it. They design systems that are honest about their limitations, not ones that look clean in a demo but collapse under the weight of a real enterprise customer.",[5216],{"type":83,"attrs":5217},{"color":85},{"type":75,"attrs":5219,"content":5220},{"textAlign":19},[5221],{"text":5222,"type":80,"marks":5223},"Technical debt in health tech is not a code problem. It's a business variable. That is why having a proactive startup tech debt strategy is essential for long-term survival. The companies that scale are the ones that managed it like one: continuously, deliberately, and before it was forced.",[5224],{"type":83,"attrs":5225},{"color":85},{"type":75,"attrs":5227,"content":5228},{"textAlign":19},[5229],{"text":5230,"type":80,"marks":5231},"And the smartest thing you can do about it is start now. The debt you have today is the cheapest version you'll ever pay. Every month you wait, the cost goes up, the window gets smaller, and the options narrow. A deliberate startup tech debt strategy built on architecture-first thinking, documentation standards, clear decisions about when to hire and when to partner, and continuous debt monitoring isn't overhead. It's the operating system of a company that scales.",[5232],{"type":83,"attrs":5233},{"color":85},{"type":623,"attrs":5235},{"id":3546,"body":5236},[5237],{"_uid":5238,"margin":1153,"component":1154},"i-bbf1f7b2-7f52-48f7-9f2d-8491ac09d21f",{"_uid":5240,"items":5241,"title":5263,"component":5264},"bc81603c-8d24-4ba8-aa22-20adcdeae389",[5242,5247,5251,5255,5259],{"_uid":5243,"title":5244,"component":5245,"description":5246},"7154d36a-d95e-4fbe-8ab5-57d83842b764","How do I know if my startup has too much technical debt?","FaqSectionItem","Watch how your team works, not how the code looks. Features taking twice as long as they used to, engineers avoiding certain parts of the system, new hires taking weeks to get productive: these are the real signals. In health tech, ask one more question: can you produce a full audit trail of patient data access on demand? If not, you already have a compliance problem.",{"_uid":5248,"title":5249,"component":5245,"description":5250},"d85d3ad7-d848-4ebd-80d8-5ba3ef5a7149","Should I rewrite my MVP before scaling?","Almost never. A full rewrite freezes your roadmap for months with nothing to show customers or investors. The better move is to identify which specific parts of your system are blocking growth or compliance, and replace those incrementally while keeping everything else running.",{"_uid":5252,"title":5253,"component":5245,"description":5254},"cd6f6f6f-93f8-46c4-a7e6-73972d27a381","What affects how long it takes to fix technical debt?","How well it's documented, how much test coverage exists, and how deep it runs. Undocumented debt is the slowest to fix because engineers have to figure out what the code was supposed to do before they can change it. In health tech, compliance requirements add extra overhead, since every fix needs to be validated against HIPAA or GDPR standards.",{"_uid":5256,"title":5257,"component":5245,"description":5258},"773dd7ad-9ce6-4c14-a5a3-adcc150af88c","How does technical debt affect HIPAA compliance?","Directly. Missing audit logs, unencrypted PHI, weak access controls: these are active violations. The longer they go unfixed, the more exposure accumulates. Unlike a slow feature, you can't patch a compliance gap quietly. It usually surfaces during a hospital procurement review, an investor audit, or a breach investigation.",{"_uid":5260,"title":5261,"component":5245,"description":5262},"100a52b3-ade8-4e26-ab22-40f71a547461","Can technical debt kill a funding round?","Yes. Investors run technical due diligence specifically to find this. If your architecture can't handle 10x growth, knowledge lives with one developer, or your compliance posture has obvious gaps, it can end the conversation entirely in health tech.","HealthTech legacy FAQ","FaqSection",[5266,386,1158,5267,380],"96662c98-2d7a-4dcd-880f-48e31a675714","e718446b-70ec-4ca3-8bb4-0c86fcbab4ec",{"type":72,"content":5269},[5270],{"type":75,"attrs":5271,"content":5272},{"textAlign":19},[5273],{"text":5274,"type":80},"Technical debt in HealthTech is more than an engineering hurdle; it is a high-stakes business risk that compounds through regulatory non-compliance, security vulnerabilities, and integration bottlenecks. Unlike standard SaaS, deferred maintenance in healthcare can lead to patient safety issues, failed Series A due diligence, and multi-million dollar HIPAA penalties. By adopting a proactive framework—prioritizing debt based on compliance and revenue risks while utilizing incremental modernization strategies like the Strangler Fig pattern—founders can resolve legacy issues without sacrificing product velocity. Ultimately, managing technical debt deliberately is essential for scaling enterprise-grade software that satisfies hospital procurement standards and secures long-term growth in a highly regulated market.",[5276],{"_uid":5277,"component":521,"imageLink":5278,"imageAltText":3491,"mobileImageLink":5280,"originalImageWidth":92,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"9962206d-156d-43cc-b125-3a952eacb413",{"id":92,"url":5279,"linktype":507,"fieldtype":95,"cached_url":5279},"https://a.storyblok.com/f/202591/2304x1576/4e5a6abd58/technical-debt-in-healthtech.png",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[],"technical-debt-in-healthtech","blog/technical-debt-in-healthtech",-7310,[],"b1a028c2-6c7d-478f-85ed-e3b8fb00502d","2026-04-09T13:36:20.769Z",[],[],[],{"age":5292,"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":5293,"etag":5294,"per-page":5295,"referrer-policy":39,"sb-be-version":40,"server":41,"total":5296,"transfer-encoding":42,"vary":43,"via":44,"x-amz-cf-id":5297,"x-amz-cf-pop":46,"x-cache":47,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":5298,"x-runtime":5299,"x-xss-protection":53},"157","Thu, 16 Apr 2026 14:21:02 GMT","W/\"8eb41feb097ba578286e41a4b4f69770\"","3","614","OQDgafXCAr78Ooa-ZpAtCg5vks0Tv_i2rDEatrMWL58w9jCGjiJyDg==","71e85cd1-ca05-4709-a14b-842956ebd174","0.180571",614,{"data":5302,"headers":5804},{"story":5303,"cv":28,"rels":5802,"links":5803},{"name":5304,"created_at":5305,"published_at":5306,"updated_at":5307,"id":5308,"uuid":5309,"content":5310,"slug":5304,"full_slug":5795,"sort_by_date":19,"position":5796,"tag_list":5797,"is_startpage":22,"parent_id":5798,"meta_data":19,"group_id":5799,"first_published_at":5800,"release_id":19,"lang":26,"path":19,"alternates":5801,"default_full_slug":19,"translated_slugs":19},"future-of-retail","2023-11-21T10:46:19.008Z","2025-06-25T05:45:42.776Z","2025-06-25T05:45:42.792Z",408609954,"783d9356-b6ed-481b-903d-ddcd141dd282",{"seo":5311,"_uid":5325,"heroForm":5326,"component":5466,"heroSection":5467,"contactSection":5468,"pdfPreviewImage":5469,"optionalSections":5475,"whatsInsideTitle":5488,"bottomDownloadText":92,"whatsInsideCaption":92,"isSimpleHeroSection":5554,"whatsInsideSubtitle":5732,"whatsInsideCtaButton":5733,"bottomDownloadSubtitle":92,"whatsInsideBulletPoints":5734},[5312],{"_uid":5313,"image":5314,"title":5323,"noIndex":22,"component":569,"description":5324,"canonicalUrl":92},"cc4374b2-5ed1-4e68-9c9d-c8657d664cac",[5315],{"_uid":5316,"component":521,"imageLink":5317,"imageAltText":5319,"mobileImageLink":5320,"originalImageWidth":5321,"originalImageHeight":5322,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"4f81fb9f-9d65-41a0-966e-1aa726b6026f",{"id":92,"url":5318,"linktype":507,"fieldtype":95,"cached_url":5318},"https://a.storyblok.com/f/202591/1200x631/0c7b33b1e3/future-of-retail-featured-image.png","Future of retail",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"1200","630","Unlock the Future of Retail: Gain Insights from Industry Leaders | Monterail","Stay ahead in retail with insights from industry leaders. Explore personalization, live shopping, immersive tech, and sustainability strategies for a competitive edge.","5d3dc7d1-8579-4acb-8177-324a17e341d8",[5327],{"_uid":5328,"image":5329,"input":5337,"title":5381,"caption":5398,"formType":5420,"subtitle":5421,"component":5446,"ctaButton":5447,"imageSide":4291,"isScrollForm":22,"thankYouTitle":5454,"backgroundColor":88,"hubspotFormGuid":5455,"thankYouMessage":5456,"topScrollSection":5465,"isFullWidthSection":22,"getResponseListName":5304},"d46e20c8-58e3-4028-9af2-c86590b2964f",[5330],{"_uid":5331,"component":521,"imageLink":5332,"imageAltText":5319,"mobileImageLink":5334,"originalImageWidth":5335,"originalImageHeight":5336,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"9c8ae359-ac05-47d4-be90-ed23d8dbcd9b",{"id":92,"url":5333,"linktype":507,"fieldtype":95,"cached_url":5333},"https://a.storyblok.com/f/202591/585x485/024a818689/retail-cover.svg",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"585","485",[5338,5345,5351,5356,5361],{"_uid":5339,"type":80,"isInline":22,"variable":5340,"component":5341,"isTextarea":22,"placeholder":5342,"defaultValue":92,"isHiddenField":22,"validationRule":5343},"cbc6decc-fd10-4dfe-adef-1dbde44a725b","firstname","inputText","Name*",[5344],"isRequired",{"_uid":5346,"type":5347,"isInline":22,"variable":5347,"component":5341,"isTextarea":22,"placeholder":5348,"defaultValue":92,"isHiddenField":22,"validationRule":5349},"76352223-bf69-4723-91f3-76674f030d35","email","Email*",[5344,5350],"isEmail",{"_uid":5352,"type":80,"isInline":22,"variable":5353,"component":5341,"isTextarea":22,"placeholder":5354,"defaultValue":92,"isHiddenField":22,"validationRule":5355},"0df835db-95ee-4162-9ef6-e2e018267860","company","Company name*",[5344],{"_uid":5357,"type":80,"isInline":22,"variable":5358,"component":5341,"isTextarea":22,"placeholder":5359,"defaultValue":92,"isHiddenField":22,"validationRule":5360},"265ab704-27a2-45b8-bd91-1a431953b9b9","role","What's your role?*",[5344],{"_uid":5362,"options":5363,"variable":5377,"component":5378,"placeholder":5379,"defaultValue":92,"isHiddenField":22,"validationRule":5380},"33924d2c-59b3-45f6-952a-567ea00cdab8",[5364,5368,5371,5374],{"_uid":5365,"label":5366,"variable":5366,"component":5367},"279f1ead-15dc-4ce0-96c7-09b1463f7038","Live Shopping Revolution","labelWithVariable",{"_uid":5369,"label":5370,"variable":5370,"component":5367},"2ca9200a-41a0-4425-8d2e-38a3b51b4ee8","Personalization Strategies",{"_uid":5372,"label":5373,"variable":5373,"component":5367},"e093053d-9108-40a2-bf3d-16e798704648","Digital Transformation",{"_uid":5375,"label":5376,"variable":5376,"component":5367},"079109d0-5bee-44ee-9d6d-a559c24254be","Sustainability in Retail","retaileventpannel","baseSelect","Specific panel of interest (if any)",[],[5382],{"tag":5383,"_uid":5384,"title":5385,"fontSize":5395,"component":5396,"mobileFontSize":5397},"h1","a008fb5a-0ae8-4c38-8980-1ba395c90a3e",{"type":72,"content":5386},[5387],{"type":75,"content":5388},[5389],{"text":5390,"type":80,"marks":5391},"Unlock the Future of Retail",[5392],{"type":83,"attrs":5393},{"color":5394},"rgb(0, 0, 0)","6.4rem;7.04rem","baseTitle","4rem;5.2rem",[5399],{"_uid":5400,"content":5401,"fontSize":5419,"component":87,"fontColor":92,"uppercase":22},"494fc422-b186-44f4-bd8a-ca97dd4adbb4",{"type":72,"content":5402},[5403],{"type":75,"content":5404},[5405,5411],{"text":5406,"type":80,"marks":5407},"CLICK \"RECEIVE ACCESS\" TO CONSENT TO PROCESSING YOUR DATA BY MONTERAIL FOR MARKETING PURPOSES, INCLUDING SENDING EMAILS. FOR DETAILS SEE OUR ",[5408],{"type":83,"attrs":5409},{"color":5410},"rgb(147, 155, 160)",{"text":5412,"type":80,"marks":5413},"PRIVACY POLICY.",[5414,5417],{"type":98,"attrs":5415},{"href":5416,"uuid":470,"anchor":19,"target":727,"linktype":139},"/privacy-policy",{"type":83,"attrs":5418},{"color":5410},"1.2rem;1.92rem;-2%","from_with_mobile_infopack_download",[5422],{"_uid":5423,"content":5424,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"a1535000-eaf0-44f1-9aed-27dc787d999d",{"type":72,"content":5425},[5426,5433],{"type":75,"content":5427},[5428],{"text":5429,"type":80,"marks":5430},"Gain insights from industry leaders, explore successful strategies, and stay ahead in the evolving retail landscape.",[5431],{"type":83,"attrs":5432},{"color":5394},{"type":75,"content":5434},[5435,5440,5442],{"text":5436,"type":80,"marks":5437},"Learn more about personalization strategies, live shopping implementation, immersive technologies boosting customer experience, and sustainability in retail ",[5438],{"type":83,"attrs":5439},{"color":5394},{"text":5441,"type":80},"(Check your spam folder in case the email was mistakenly filtered)",{"text":1143,"type":80,"marks":5443},[5444],{"type":83,"attrs":5445},{"color":5394},"formSection",[5448],{"_uid":5449,"color":5185,"ctaLink":5450,"ctaText":5451,"variant":5452,"hasArrow":22,"component":5453,"mobileCtaText":92},"0f2732c1-04ab-4094-8f9e-b5af978bdd9a",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"Receive access","primary","baseButton","Awesome, your access to the recording is on the way. Enjoy!","f9935701-4795-4f99-8266-7f33603cc608",[5457],{"_uid":5458,"content":5459,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"6c442dac-2226-4740-ba2e-18de2341c300",{"type":72,"content":5460},[5461],{"type":75,"content":5462},[5463],{"text":5464,"type":80},"-The Monterail team",[],"downloadPdfPage",[],[],[5470],{"_uid":5471,"component":521,"imageLink":5472,"imageAltText":5473,"mobileImageLink":5474,"originalImageWidth":5335,"originalImageHeight":5336,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"098efbb7-bbfe-49de-8f42-7cc39a931879",{"id":92,"url":5333,"linktype":507,"fieldtype":95,"cached_url":5333},"Futre of retail",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},[5476,5555,5649],{"_uid":5477,"content":5478,"component":5553,"isSubsection":22,"sectionTitle":92,"hasSubsection":22,"backgroundColor":88,"hasSectionTitle":5554},"23151f31-67cd-4b06-8bfb-6f0fcd92e99f",[5479],{"_uid":5480,"component":5481,"leftColumnText":5482,"rightColumnText":5494,"leftColumnBottomImage":5552},"481b1c6b-c175-4c8c-94ad-41713bc7ccc6","twoColumnText",{"type":72,"content":5483},[5484,5489,5490],{"type":580,"attrs":5485,"content":5486},{"level":582},[5487],{"text":5488,"type":80},"Key topics explored",{"type":75},{"type":75,"content":5491},[5492],{"text":5493,"type":80},"Explore key takeaways from our recent event that shape the future of retail.",{"type":72,"content":5495},[5496],{"type":642,"content":5497},[5498,5507,5516,5525,5534,5543],{"type":645,"content":5499},[5500],{"type":75,"content":5501},[5502],{"text":5503,"type":80,"marks":5504},"Navigate Digital Shifts: Understand the transformed retail landscape driven by generational shifts.",[5505],{"type":83,"attrs":5506},{"color":5394},{"type":645,"content":5508},[5509],{"type":75,"content":5510},[5511],{"text":5512,"type":80,"marks":5513},"Embrace Personalization: Explore trends from playfulness to democratization.",[5514],{"type":83,"attrs":5515},{"color":5394},{"type":645,"content":5517},[5518],{"type":75,"content":5519},[5520],{"text":5521,"type":80,"marks":5522},"Harmony of Tradition and Innovation: Witness how technology and tradition coexist.",[5523],{"type":83,"attrs":5524},{"color":5394},{"type":645,"content":5526},[5527],{"type":75,"content":5528},[5529],{"text":5530,"type":80,"marks":5531},"Sustainable Futures: Explore the eco-friendly side of fashion.",[5532],{"type":83,"attrs":5533},{"color":5394},{"type":645,"content":5535},[5536],{"type":75,"content":5537},[5538],{"text":5539,"type":80,"marks":5540},"Expert Dialogues: Gain insights from industry leaders.",[5541],{"type":83,"attrs":5542},{"color":5394},{"type":645,"content":5544},[5545],{"type":75,"content":5546},[5547],{"text":5548,"type":80,"marks":5549},"Effective Sales Strategies: Enhance your business with proven methods.",[5550],{"type":83,"attrs":5551},{"color":5394},[],"twoColumnTextSection",true,{"_uid":5556,"title":5557,"subtitle":92,"component":5558,"listItems":5559,"backgroundColor":5648,"hasListTopHorizontalBar":22,"hasListBottomHorizontalBar":22},"97c7db88-825f-4427-9b46-2e19fed2722e","Experts","twoColumnHeaderAndListSection",[5560,5579,5596,5613,5631],{"_uid":5561,"image":5562,"fullName":5567,"position":5570,"component":5571,"description":5572,"linkedinLink":5578},"e2e554aa-ba37-47cd-a67d-197e39ddc63d",[5563],{"_uid":5564,"component":521,"imageLink":5565,"imageAltText":5567,"mobileImageLink":5568,"originalImageWidth":5569,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"00b37212-6c17-4b7d-87f5-4d0162b35a42",{"id":92,"url":5566,"linktype":507,"fieldtype":95,"cached_url":5566},"https://a.storyblok.com/f/202591/810x810/169cbe49b4/correy-morris.png","Corey Morris",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"64","Chief Marketing Officer of Sprii","personCard",{"type":72,"content":5573},[5574],{"type":75,"content":5575},[5576],{"text":5577,"type":80},"CMO of Sprii, leverages over 20 years of marketing experience from notable institutions like Airbnb. His unique background in meteorology and alumni relations fuels his passion for pioneering new tech frontiers.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"_uid":5580,"image":5581,"fullName":5586,"position":5588,"component":5571,"description":5589,"linkedinLink":5595},"4664ccf6-6312-4f7c-bbb7-ebecbe98aaca",[5582],{"_uid":5583,"component":521,"imageLink":5584,"imageAltText":5586,"mobileImageLink":5587,"originalImageWidth":5569,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"2367ba6d-696f-4a8a-840f-6cd95d891dbe",{"id":92,"url":5585,"linktype":507,"fieldtype":95,"cached_url":5585},"https://a.storyblok.com/f/202591/732x732/baec70c125/joanna-maciaszczyk.png","Joanna Maciaszczyk",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"Head of Marketing for Selsey & Homebook",{"type":72,"content":5590},[5591],{"type":75,"content":5592},[5593],{"text":5594,"type":80},"Experienced Head of Marketing, strategically guides brands across touchpoints, blending communication, advertising, and event management expertise.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"_uid":5597,"image":5598,"fullName":5603,"position":5605,"component":5571,"description":5606,"linkedinLink":5612},"e1bb117f-d917-466d-9c29-b731cc571f17",[5599],{"_uid":5600,"component":521,"imageLink":5601,"imageAltText":5603,"mobileImageLink":5604,"originalImageWidth":5569,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"1722296e-769b-4681-9c96-797a1b43baa0",{"id":92,"url":5602,"linktype":507,"fieldtype":95,"cached_url":5602},"https://a.storyblok.com/f/202591/732x732/e2ab9982c5/malgorzata-rusin.png","Małgorzata Rusin",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"Product Discovery\u2028and Consumer Insights Manager, VOX",{"type":72,"content":5607},[5608],{"type":75,"content":5609},[5610],{"text":5611,"type":80},"Affiliated with the forward-thinking brand VOX, she focuses on developing outstanding products within eCommerce and digital transformation, driven by a deep understanding of both customer and business needs.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"_uid":5614,"image":5615,"fullName":5622,"position":5623,"component":5571,"description":5624,"linkedinLink":5630},"a377b45e-8884-4db7-bf8b-7c80148b0a51",[5616],{"_uid":5617,"component":521,"imageLink":5618,"imageAltText":5620,"mobileImageLink":5621,"originalImageWidth":5569,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"d3378dc1-1b0a-4896-b964-00186db2fa57",{"id":92,"url":5619,"linktype":507,"fieldtype":95,"cached_url":5619},"https://a.storyblok.com/f/202591/810x810/c1bfc66711/shri-sharma.png","Shri Sharma",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"Sri Sharma","CEO & Co-Founder of Increasingly.com",{"type":72,"content":5625},[5626],{"type":75,"content":5627},[5628],{"text":5629,"type":80},"Serial tech entrepreneur, is the CEO & Co-Founder of Increasingly.com, a retail tech aiding clients like Sephora and Samsung. He's earned recognition such as the Sunday Times Tech Track 100 and Deloitte Tech Fast 50, and holds a Google-awarded scholarship for AI study at Singularity University.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},{"_uid":5632,"image":5633,"fullName":5638,"position":5640,"component":5571,"description":5641,"linkedinLink":5647},"d31efe51-baa2-4e96-a63c-d92bfa205f25",[5634],{"_uid":5635,"component":521,"imageLink":5636,"imageAltText":5638,"mobileImageLink":5639,"originalImageWidth":5569,"originalImageHeight":92,"originalMobileImageWidth":92,"originalMobileImageHeight":92},"dbf8d610-eb33-433a-b1e4-4c272f8b2997",{"id":92,"url":5637,"linktype":507,"fieldtype":95,"cached_url":5637},"https://a.storyblok.com/f/202591/776x776/0d48055933/kurt-svegard.png","Kurt Svegård",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"Chief Operating Officer - Fashion Innovation Center",{"type":72,"content":5642},[5643],{"type":75,"content":5644},[5645],{"text":5646,"type":80},"Global Business and Strategy consultant, specializes in business transformation for brands, fashion startups, and retailers, addressing technology, evolving consumer requirements, emerging business models. and digital content challenges since 2015.",{"id":92,"url":92,"linktype":139,"fieldtype":95,"cached_url":92},"light-gray",{"_uid":5650,"title":5651,"subtitle":92,"component":5558,"listItems":5652,"backgroundColor":88,"hasListTopHorizontalBar":22,"hasListBottomHorizontalBar":22},"db11fdd6-f924-4a49-8d4a-fcea8aa2b9f8","Four panel discussions",[5653,5674,5694,5713],{"_uid":5654,"text":5655,"title":5664,"component":5673},"4cf525b5-c854-4593-95cf-0b732808ac63",[5656],{"_uid":5657,"content":5658,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"64a3ee60-d0d8-4c88-9f31-8d14adf8cf58",{"type":72,"content":5659},[5660],{"type":75,"content":5661},[5662],{"text":5663,"type":80},"Discover the unprecedented success of live shopping, delving into the world of real-time interactions and exclusive offers that contribute to an impressive 60% conversion rate.",[5665],{"tag":5666,"_uid":5667,"title":5668,"fontSize":5395,"component":5396,"mobileFontSize":5397},"h2","b1480f9e-fd01-4e62-bdae-b58029c8f9f4",{"type":72,"content":5669},[5670],{"type":75,"content":5671},[5672],{"text":5366,"type":80},"textWithTitle",{"_uid":5675,"text":5676,"title":5686,"component":5673},"e03708a8-e90a-4825-a994-37c04ef84bd2",[5677],{"_uid":5678,"content":5679,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"01e082fb-49d3-44fc-a723-d9913906ff14",{"type":72,"content":5680},[5681,5685],{"type":75,"content":5682},[5683],{"text":5684,"type":80},"Explore cutting-edge personalization strategies employed by brands to establish trust, forge emotional connections, and streamline choices, ultimately fostering customer loyalty in the competitive retail landscape.",{"type":75},[5687],{"tag":5666,"_uid":5688,"title":5689,"fontSize":5395,"component":5396,"mobileFontSize":5397},"a87056f5-9471-4e6a-8e10-01c9b05f5541",{"type":72,"content":5690},[5691],{"type":75,"content":5692},[5693],{"text":5370,"type":80},{"_uid":5695,"text":5696,"title":5705,"component":5673},"f8c5b34a-825d-45a1-ac11-18248895e26e",[5697],{"_uid":5698,"content":5699,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"56e8ae0b-4e32-41bf-b05d-da864e015bf2",{"type":72,"content":5700},[5701],{"type":75,"content":5702},[5703],{"text":5704,"type":80},"Examine the impact of digital transformation in retail, focusing on how the industry is embracing online platforms and immersive technologies such as augmented reality (AR) and virtual reality (VR) to elevate customer experiences to new heights.",[5706],{"tag":5666,"_uid":5707,"title":5708,"fontSize":5395,"component":5396,"mobileFontSize":5397},"64005f99-cc24-4521-b51f-21823324dc1a",{"type":72,"content":5709},[5710],{"type":75,"content":5711},[5712],{"text":5373,"type":80},{"_uid":5714,"text":5715,"title":5724,"component":5673},"762f8af6-e794-4c73-b8d1-d6bb1a709502",[5716],{"_uid":5717,"content":5718,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"0b96eb43-3c83-4c3e-9f77-b55392e4fa2b",{"type":72,"content":5719},[5720],{"type":75,"content":5721},[5722],{"text":5723,"type":80},"Dive into the multifaceted realm of sustainability in retail, exploring the compliance landscape, innovative business models, and collaborative efforts that are shaping a more sustainable future for the industry",[5725],{"tag":5666,"_uid":5726,"title":5727,"fontSize":5395,"component":5396,"mobileFontSize":5397},"e6827fc1-0d00-4477-8c4a-ab749792a4c1",{"type":72,"content":5728},[5729],{"type":75,"content":5730},[5731],{"text":5376,"type":80},"Explore the recorded insights from \"Retail Revolutions: Navigating the Future,\" an online event that unfolded on October 26, 2023. Discover insightful perspectives from leaders shaping the retail industry. Engage in thoughtful panel discussions, explore the dynamics of live shopping, and delve into sustainable practices reshaping the fashion landscape. ",[],[5735,5745,5755,5765,5775,5785],{"_uid":5736,"content":5737,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"8596b35b-4391-4c94-af50-982e40129bf8",{"type":72,"content":5738},[5739],{"type":75,"content":5740},[5741],{"text":5503,"type":80,"marks":5742},[5743],{"type":83,"attrs":5744},{"color":5394},{"_uid":5746,"content":5747,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"a57ec061-2c53-46d0-8666-e68ab34e826a",{"type":72,"content":5748},[5749],{"type":75,"content":5750},[5751],{"text":5512,"type":80,"marks":5752},[5753],{"type":83,"attrs":5754},{"color":5394},{"_uid":5756,"content":5757,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"8c26abb3-6a78-4749-8573-0ef265e3f74c",{"type":72,"content":5758},[5759],{"type":75,"content":5760},[5761],{"text":5521,"type":80,"marks":5762},[5763],{"type":83,"attrs":5764},{"color":5394},{"_uid":5766,"content":5767,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"70361f6e-8f8e-4e18-9694-3fd3ebef4ed4",{"type":72,"content":5768},[5769],{"type":75,"content":5770},[5771],{"text":5530,"type":80,"marks":5772},[5773],{"type":83,"attrs":5774},{"color":5394},{"_uid":5776,"content":5777,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"3f12be5c-7e73-43a6-b2e3-ba85c9955d1a",{"type":72,"content":5778},[5779],{"type":75,"content":5780},[5781],{"text":5539,"type":80,"marks":5782},[5783],{"type":83,"attrs":5784},{"color":5394},{"_uid":5786,"content":5787,"fontSize":86,"component":87,"fontColor":92,"uppercase":22},"8dcc198a-1f7c-4267-a5cd-533fb2eed0ac",{"type":72,"content":5788},[5789],{"type":75,"content":5790},[5791],{"text":5548,"type":80,"marks":5792},[5793],{"type":83,"attrs":5794},{"color":5394},"resources/future-of-retail",-50,[],389788281,"14d16a58-78ea-4f2f-811d-3086ac52ed7c","2023-12-05T09:25:52.740Z",[],[],[],{"cache-control":33,"connection":34,"content-encoding":35,"content-type":36,"date":5805,"etag":5806,"referrer-policy":39,"sb-be-version":40,"server":41,"transfer-encoding":42,"vary":43,"via":5807,"x-amz-cf-id":5808,"x-amz-cf-pop":5809,"x-cache":5810,"x-content-type-options":48,"x-frame-options":49,"x-permitted-cross-domain-policies":50,"x-request-id":5811,"x-runtime":5812,"x-xss-protection":53},"Thu, 16 Apr 2026 14:26:53 GMT","W/\"828fb3050e1f85aa2a783b4d56f7d515\"","1.1 9ed589723d880832fbd56a7bfede4018.cloudfront.net (CloudFront)","1zkY2vUSfN0UPgTtCS4sNlHKA3CFK7Vn2Abd9AuPaoWPWFi63VEpLQ==","LAX54-P1","Miss from cloudfront","8c08dcf1-6688-4fcb-a0f3-e78a433d294c","0.057328",1776349613125]