Stanford Hacking for Defense v3.0

Stanford Hacking for Defense v3.0

Coming off an outstanding visit to our National Capital where we had a chance to show Congressional staff just how impactful Hacking for Defense is as a means to get great young men and women involved in working on things that are important to our National Security (see the news here), I'm really jazzed to be back in Palo Alto to get things stirred up here once more.

It's finals week for the winter quarter at Stanford University which means we are getting ready to kick off our 3rd Hacking for Defense course at Stanford in just a couple weeks. I'm thrilled to be back on the teaching bench with Steve Blank and Steve Weinstein where it's a battle to see which one of us learns the most during the course. I'm equally excited to see Ranger (and Ph.d) Jeff Decker join us to fill Joe Felter's shoes while he is once more serving his country in the Pentagon. I'm equally stoked to have a couple of special guests join us this year. First, Alex Osterwalder will be on hand during week two to give our students a leg up as they start to really dig into beneficiary discovery and value propositions. Then a few weeks later Ted Koppel, former newscaster and author of the New York Times Best Seller, Lights Out: A Cyber Attack, A Nation Unprepared, Surviving the Aftermath, will join us as well.

We are proud to see our plank owning course advisors, former Secretary of Defense Bill Perry and Stanford Venture Technology Program Director Tom Byers back again. Also joining us this year as course advisors are Arun Majumdar, former ARPA-E Director and now Director of the Precourt Institute for Energy, and Sally Benson, Co-Director of the Precourt Institute for Energy. Finally, to show how seriously Stanford takes the transformational nature of this course, John Mitchell, Stanford's Vice Provost for Teaching and Learning will also join us as an advisor.

Rounding out the teaching team are the real workhorses, our teaching assistants. Sam Jackson, (a 2nd year MBA candidate at the Stanford Graduate School of Business) and Will Papper (an undergraduate in symbolic systems) were students in last year's H4D course. Will is now the founder and CEO of Librarian.ai, one of six companies to spin out of previous H4D classes. Joining Sam and Will are Annie Shiel, an MA candidate in International Studies and Paricha Duangtaweesub, a graduate student in the Design Impact Program with a focus on energy and climate change.

Everything Begins with a Problem

Thanks to our continued partnership with MD5 and the Office of Naval Research we have an exceptional array of problems for the course this year. Particularly interesting to me is seeing a problem (accountability during evacuation) I had as a young Captain in the 3rd Ranger Battalion show back up on my doorstep 20+ years later (thanks Craig Nixon and Frank Kearney for the many opportunities to learn how to count moving targets in the dark). It's interesting to note that having a 20-year-old problem show up in an H4D class is not unusual. There are thousands of zombie problems (a problem with a life of its own, that nobody wants to touch) like this one that have been around forever and aren't sexy enough to get lots of attention, but serve as one of the many things that increase the cognitive burden of service members on the front lines.

Here's the rest of a really interesting slate of problems:

Accountability during evacuation (US Special Operations Command): Build a way for a leader to keep account of which specific individuals have entered a vehicle or helicopter in order to decrease evacuation time and leave no one behind.

Cyber protection for ship based navigation systems (US Navy, Office of Naval Research): Develop a means for test engineers to conduct adequate cyber-testing of US Navy ship based navigation systems.

Installation level utility coordination (US Navy Facilities Engineering & Expeditionary Warfare Center): Develop a way for Navy and Marine Corps public works officers to partner with local utility companies in order to insure reliable delivery of power to an installation and to prevent power outages.

Personnel recovery hydration (US Air Force Research Lab): Provide a way for pilots shot down in combat to remain hydrated for 28 days.

Identifying objects from high resolution imagery (US Air Force Air Combat Command, 9th Intelligence Surveillance & Reconnaissance Squadron): Develop the capability for analysts to automate object identification in order to focus on the highest priority geographic areas most relevant to their information requirement.

E-Acquisition (Section 809 Panel/Defense Acquisition University): Enable acquisition professionals to automatically develop and coordinate program documentation related to defense acquisition.

Personnel recovery power (US Air Force Research Lab, 711th Human Performance Wing): Provide a way for pilots shot down in combat to keep critical electronic devices such as survival radios powered for 28 days.

Interested in supporting the Stanford class as an advisor for one of the teams? Please reach out to Jeff Decker at [email protected].

If you are interested in learning more about Hacking for Defense academic programs, please shoot a note to the team at H4Di.org.

Pete Newell: Building innovation tools to solve the worlds hardest problems @peteranewell, @hacking4defense, @bmntpartners, @H4Xlabs

Ian Eishen

Director, Global Public Sector | Venture Partner | Presidential Leadership Scholar

7 年

Can't wait to work with the class on this group of problems.

Jordan Steinert

Senior Director, Strategic Integration at Northwestern Mutual

7 年

Quite the slate of challenges indeed! Look forward to hearing more about the team’s progress and perseverance. Thanks for sharing!

要查看或添加评论,请登录

Peter Newell的更多文章

  • The Common Mission Project Task Force Report

    The Common Mission Project Task Force Report

    One thing we can say with certainty about the world today: It’s constantly changing. In world powers, politics and…

    4 条评论
  • Smart Growth @BMNT - Tim Donoghue

    Smart Growth @BMNT - Tim Donoghue

    Helping large organizations fix broken things has been a growth business for BMNT since we started the company. This…

    4 条评论
  • Smart Growth @BMNT - Introducing Heather Hall

    Smart Growth @BMNT - Introducing Heather Hall

    Finding & acquiring people who are the 95 percentile fit for your company can be a bit of a lift, both for the…

    2 条评论
  • Smart growth starts early

    Smart growth starts early

    It is my distinct pleasure each year to introduce the incredibly talented team of interns who are joining BMNT for the…

    3 条评论
  • Smart Growth: Fueling a great team and an even greater mission

    Smart Growth: Fueling a great team and an even greater mission

    A few years ago we lit the match that started an innovation fire across DoD and the intelligence community. This year…

    3 条评论
  • Wanted: A Few Good Problems

    Wanted: A Few Good Problems

    First taught at a single university in 2016, Hacking for Defense will be offered at over 20 universities in the…

    3 条评论
  • More Smart Growth @BMNT

    More Smart Growth @BMNT

    I've long said innovation is less about technology and more about sociology and our ability to rapidly build networks…

    2 条评论
  • Smart Growth at BMNT

    Smart Growth at BMNT

    What do a retired Army office, a senior research scholar and an accomplished designer have in common? Two things for…

    6 条评论
  • Innovation is made possible by people - thats why we invest early

    Innovation is made possible by people - thats why we invest early

    Every summer brings about the end of the Stanford Hacking for Defense course just about the time our summer interns…

    1 条评论
  • The Echelons of Innovation

    The Echelons of Innovation

    Steve Blank and I have touched almost every DoD and intelligence agency innovation effort through BMNT’s H4X? programs,…

    15 条评论

社区洞察

其他会员也浏览了