Remove IP Remove Open Source Remove Software Remove Software Development
article thumbnail

I-Corps @ NIH – Pivoting the Curriculum

Steve Blank

This lecture order was embedded in the Udacity Lectures , the syllabi and educators guide I open-sourced. Activities cover clinical trials, FDA approvals, Freedom to Operate (IP, Licenses) software development, drug or device design, etc. Partners are external resources necessary to execute the Activities.

article thumbnail

Don’t Sleep on Lightning

Version One Ventures

Up until late August, Lightning Labs had capped the channel capacity and payment size for users of their popular implementation of the network to ~$2000 USD and ~$500 respectively to better protect user funds with experimental software. . Some early open source projects include Whatsatt and Juggernaut. 3) Exchanges + HFTs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lessons Learned: The lean startup

Startup Lessons Learned

But by taking advantage of open source, agile software, and iterative development, lean startups can operate with much less waste. I am heavily indebted to earlier theorists, and highly recommend the books Lean Thinking and Lean Software Development. The lean startup is an application of Lean Thinking.

Lean 168
article thumbnail

How To Bootstrap Your Startup

www.readwriteweb.com

But it is fraught with risks - and the primary risk you need to guard against is software development failure. The main causes are: Client fails to precisely express their requirements to the vendor; Client continuously changes their mind during the development process; A poorly constructed development contract.

article thumbnail

Startups in stealth mode need one piece of advice - Discussion

news.ycombinator.com

For three years I worked at Bug Labs (open source hardware company). We not only told everyone what we did, we posted the source code and the blueprints online. The article and HN are concerned with software. One thing Id add: IP- and idea-defense isnt always the strategy behind the stealth tactic.

Stealth 41
article thumbnail

30 Machine Intelligence Startups to Watch in Israel

VC Cafe

This is done by enriching transaction data points such as name, email address, and billing and shipping address with around 2,000 extra data points, such as an IP latency check to measure the real distance from the user, IP connection type, distance between key strokes, and email name match. Logz.io (2014) – Logz.io

article thumbnail

How to Start a Startup

www.paulgraham.com

I wanted to work in the pure, intellectual world of software, not deal with customers mundane problems. People who dont want to get dragged into some kind ofwork often develop a protective incompetence at it. Some believe only businesspeople can do this-- that hackers can implement software, but not design it. Thats nonsense.

Startup 105