article thumbnail

Fighting an Asymmetrical Cyber War– Why We Need to Take A Different Approach

Pascal's View

… An apparently perfect device can provide a safe harbor for numerous threats– in the form of old and vulnerable chip designs, Trojan horses, or kill switches– that are difficult or impossible to detect.” networks, an approach that is very different from the current path that the U.S. is following. “ WESLEY K.

article thumbnail

The Incredible Sinking Bubble (Debating the Tech Bubble with Steve Blank: Part III)

Ben's Blog

This is odd, because in the previous technology bubble of 1999-2000, the veteran companies such as Cisco, Sun, and Oracle experienced meteoric rises in their share prices. He unspools a captivating theory with four psychological phases: stealth, awareness, mania, and blow off.

IPO 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 30 Startup Technology and Product Posts for September 2010

SoCal CTO

want to sidestep the argument about whether or not it's good to be " stealth " or not, and work with the assumption that if you've purchased the domain name, you're going to put up some sort of website. The challenge, of course, partially lies in the definition of “good design&#. Good Design = Beautiful/Cool Design.

article thumbnail

The Future of Startups 2013-2017

Scalable Startup

In the last five years, there’s been this sort of acknowledgment of the consumerization of the enterprise, which is consumer product development, design methods applied to business software, of which SaaS and cloud and all these things are examples. Marc Andreessen: We have a bunch of stealth investments.