This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Todd Branchflower took my Lean LaunchPad class having been entrepreneurial enough to convince the Air Force send him to Stanford to get his graduate engineering degree. Graduation day with classmate Joseph Helton (right), killed in action in Iraq in 2009. I could recite requirements and concepts of operations from memory.
The trick is we use the same Lean LaunchPad / I-Corps curriculum — and the same class structure – experiential, hands-on– driven this time by a mission -model not a business model. Hacking for Defense has its origins in the Lean LaunchPad class I first taught at Stanford in 2011. Goals for the Hacking for Defense Class.
Joe Felter , Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy. John Raymond , Chief of Space Operations, United States Space Force. He or she has to conduct operations today.
Some are strategic peers, some are near peers in specific areas, some are threats as non-state disrupters operating with no rules. Army’s Rapid Equipping Force on the battlefields of Iraq and Afghanistan finding and deploying technology solutions against agile insurgents. Newell ran the U.S.
And the trick is we use the same Lean LaunchPad / I-Corps curriculum — and kept the same class structure – experiential, hands-on, driven this time by a mission -model not a business model. Hacking for Defense has its origins in the Lean LaunchPad class I first taught at Stanford in 2011. Goals for the Hacking for Defense Class.
Beyond just those who will be hearing about the lean startup for the first time, Im expecting to shake a lot of hands and have a lot of interesting side conversations. The US is headed to be a second rate or third rate power if policy isn't changed to permit new and ground breaking applications to operate in large networks.
And the trick is we use the same Lean LaunchPad / I-Corps curriculum — and kept the same class structure – experiential, hands-on, driven this time by a mission -model not a business model. Hacking for Defense has its origins in the Lean LaunchPad class I first taught at Stanford in 2011. Goals for the Hacking for Defense Class.
As I later discovered, Joe’s first act was 24 years in the Army Special Operations Forces (SOF), retiring as a Colonel. Putting theory into practice, he went to Iraq in 2008 as part of the 75th Ranger Regiment, in support of a Joint Special Operations Task Force. He did a tour with the 75th Ranger Regiment as a platoon leader.
This book may be the Iraq war equivalent of “ Dispatches &# which defined Vietnam for my generation. Every potential startup founder should think about their level of comfort operating in chaos and uncertainty. Both reminded me why National Service would be a very good idea.) It may not be for you.
It combines the same Lean Startup Methodology used by the National Science Foundation to commercialize science, with the rapid problem sourcing and curation methodology developed on the battlefields in Afghanistan and Iraq by Colonel Pete Newell and the US Army’s Rapid Equipping Force. Goals for the Hacking for Defense Class.
When Colonel Peter Newell headed up the Army’s Rapid Equipping Force (REF) he used lean methods on the battlefields of Iraq and Afghanistan to provide immediate technology solutions to urgent problems. Filed under: Customer Development , Hacking For Defense , Lean LaunchPad. Now the team had a dilemma.
Our primary goal was to teach students Lean Innovation while they engaged in a national public service. Hacking for Defense has its origins in the Lean LaunchPad class I first taught at Stanford in 2011. Wondering how we could get students engaged, we realized the same Lean LaunchPad/I-Corps class would provide a framework to do so.
Our goal was to scale these classes across the US giving students the opportunity to perform national service by getting solving real defense/diplomacy problems using Lean Methods. Our first Hacking for Diplomacy class ended this month. We trained our first group of educators and sponsors three months ago.
military and are now helping government agencies operate with the speed and urgency of Silicon Valley. Army special operations before retiring from active duty service in 2014. During his military career he served in Bosnia, Afghanistan, Iraq, the Arabian peninsula, Egypt, and the Horn of Africa.
BMNT , a new Silicon Valley company, is combining the Lean Methods it learned in combat with the technology expertise and speed of startups. The OODA Loop was the Lean Startup philosophy before lean. Iraq, Afghanistan and the Army’s Rapid Equipping Force (REF). In peacetime the U.S. In World War II the U.S.
The teams live and die by the Lean Startup credo: “There are no facts inside the building so get the hell outside.” But by week 5, (this week) the teams have either embraced the Lean process or we’re not going to get through to them. First and foremost, it is experiential and hands-on. If you can’t see the presentation click here.
Our goal was to scale these classes across the US giving students the opportunity to perform national service by getting solving real defense/diplomacy problems using Lean Methods. Our first Hacking for Diplomacy class ended this month. We trained our first group of educators and sponsors three months ago.
Part 1 talked about what I saw and learned – the layout of a carrier, how the air crew operates and how the carrier functions in context of the other ships around it (the strike group.) For targets over uncontested airspace (Iraq, Afghanistan, Syria, Somalia, Yemen, Libya, etc.) that’s pretty easy.
The teams live and die by the Lean Startup credo: “There are no facts inside the building so get the hell outside.” But by week 5, (this week) the teams have either embraced the Lean process or we’re not going to get through to them. First and foremost, it is experiential and hands-on. If you can’t see the presentation click here.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content