Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] MS&E 297: Hacking for Defense (New Course Spring 2016)

Yosem Companys companys at stanford.edu
Mon Jan 18 17:55:46 PST 2016


From: Kimberly Diane Chang <kdchang at stanford.edu>

*MS&E 297 - Hacking for Defense *
Solving National Security Issues with the Lean Launchpad

Interested in Entrepreneurship? Innovating at speed? Helping to make the
world a better place? Working closely with members of the military and
government to solve real, important problems?

Then consider applying for MS&E 297 - Hacking for Defense.  A new class in
Spring 2016 with a teaching team led by *Steve Blank *and including *Tom
Byers *(Professor MS&E), *Joe Felter* (CISAC Senior Research Scholar),
and *Pete
Newell* (Managing Partner BMNT Partners).  In the class, students will
apply the Lean Launchpad methodology to problems proposed or approved by
Department of Defense/Intelligence Community sponsors.

Some of the problems already approved include:


Humanitarian Assistance / Disaster Relief Mobile and Web based App
(National Defense University)
Distributed, Disposable, Intelligence, Surveillance, and Reconnaissance
(Commander US Navy 7th Fleet)
Virtual Advice and Assistance Toolkit for IEDs (Joint Improvised Threat
Defense Agency)
Wearable Sensors and Apps for Divers (Naval Special Warfare Group 3)


Interested in solving a problem not listed here but potentially related to
the government or military? Contact the teaching team.

To learn more, visit our website: hacking4defense.stanford.edu

To receive updates about upcoming info sessions and brown bag lunches. Join
our Facebook group <https://www.facebook.com/groups/1556101194680136/> or
sign up on our email list
<https://docs.google.com/forms/d/1ZHM-ahQGIIYRCxyS2aP0XgIHwG-NF7oDJuF3LiESQxk/viewform?usp=send_form>.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20160118/77bfa7a8/attachment.html>


More information about the liberationtech mailing list