Remove item
article thumbnail

Hacking for Defense @ Stanford – Weeks 8 and 9

Steve Blank

Two Items for the Bucket List. Two bucket list items got ahead of my blogging so I’ve combined the final two lecture weeks of the class into this one blog post. In addition, teams worked on understanding the costs and operations and deployment timelines for delivering the product to their sponsor. Team Dynamics.

article thumbnail

30 Entrepreneurs Reveal Their Favorite Disruptors

Hearpreneur

Papers give all entrepreneurial businesses the chance to build the exact business and operations they desire without being constrained by existing software. Thanks to Teo Vanyo, Stealth Agents ! #21- The company has three large operations across the world, with 20 smaller operations across the US. 19- Bitcoin.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Story Behind “The Secret History” Part III: The Most Important.

Steve Blank

But this digital world required new theories, and new devices – two items provided by Silicon Valley in the form of Stanford’s engineering department and the emerging/booming semiconductor business. Smart weapons, smart sensors, and stealth. But this new strategy was more than making the bombs smarter. Order Here.

article thumbnail

Stealth Mode

genuinevc.com

Stealth Mode. I’ve recently been introduced to a number of startups that are operating in “stealth mode,” and have been thinking about what to make of this fact. In a post yesterday, Keith Robinson clearly articulated one of my conclusions, “I’ve heard quite a bit about start-ups and “stealth mode.”

Stealth 40
article thumbnail

Seven Steps to Successful Project Planning

Up and Running

With a tool like Basecamp, for example, it’s easy to track progress and keep track of conversations and items that require collaboration with a few different people. For certain items, you might need to get quotes from a few different vendors. This will help your team understand the resources they have to work with to get the job done.

Framework 136
article thumbnail

Hacking For Defense In Silicon Valley

Steve Blank

At the heart of this “offset strategy” was “precision strike,” – building stealth aircraft to deliver precision guided munitions unseen by enemy radar, and designing intelligence and reconnaissance systems that would target for them. could design and produce. Hacking For Defense (H4D). In peacetime the U.S.

article thumbnail

The Red Queen Problem – Innovation in the DoD and Intelligence Community

Steve Blank

We used these tools to keep pace with the Soviet threats and eventually used silicon, semiconductors and stealth to create an offset strategy to leapfrog their military. Some are strategic peers, some are near peers in specific areas, some are threats as non-state disrupters operating with no rules.

Community 219