Steve Blank

article thumbnail

Someone Stole My Startup Idea – Part 3: The Best Defense is a Good IP Strategy

Steve Blank

Or it can be your brand , logo or domain name. social network start up – trademark and copyright are more likely. The assets you can protect may include your “core technology&# like source code, hardware designs, architectures, processes, formulas. Protection is also available for content such as music, books, or film.

article thumbnail

China Startups – The Gold Rush and Fire Extinguishers (Part 5 of 5)

Steve Blank

For the last 10 years China essentially closed its search, media and social network software market to foreign companies with the result that Google, Facebook, Twitter, YouTube, Dropbox, and 30,000 other websites were not accessible from China. business models. It’s an amazing cat and mouse system. Beijing’s Academic Hub.

China 323
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Next Bubble – Don’t Get Fooled Again

Steve Blank

In the case of this bubble, it was social networks, consumer and mobile applications, and the cloud. And it was hammered home with Color —a startup without a product —raising $40 million, at a reputed $100 million valuation, from brand name VCs who should have known better. We are seeing this bubble unfold by the book.

article thumbnail

China Startups – The Gold Rush and Fire Extinguishers (Part 5 of 5)

Steve Blank

For the last 10 years China essentially closed its search, media and social network software market to foreign companies with the result that Google, Facebook, Twitter, YouTube, Dropbox, and 30,000 other websites were not accessible from China. business models. It’s an amazing cat and mouse system. Beijing’s Academic Hub.

China 215
article thumbnail

New Rules for the New Internet Bubble

Steve Blank

This next wave of web startups; Social Networks and Mobile Applications, now reached 100’s of millions of customers. For a specific startup this list is probably a few hundred names. Show and talk at conferences, be on lots of blogs, use social networks and build a brand. Wide Adoption. Lessons Learned.

Internet 334
article thumbnail

Hacking for Defense (H4D) @ Stanford – Week 3

Steve Blank

For example, members of the DOD will not respond to ”cold calls” and those in the Intel community won’t even tell you their names. Team Right of Boom (previously named Live Tactical Threat Toolkit) is trying to help foreign military explosive ordnance disposal (EOD) teams better accomplish their mission.

article thumbnail

Hacking for Defense (H4D) @ Stanford – Week 3

Steve Blank

For example, members of the DOD will not respond to ”cold calls” and those in the Intel community won’t even tell you their names. Team Right to Boom (previously named Live Tactical Threat Toolkit) is trying to help foreign military explosive ordnance disposal (EOD) teams better accomplish their mission.