Steve Blank Podcast show

Steve Blank Podcast

Summary: Steve Blank, eight-time entrepreneur and now a business school professor at Stanford, Columbia and Berkeley, shares his hard-won wisdom as he pioneers entrepreneurship as a management science, combining Customer Development, Business Model Design and Agile Development. The conclusion? Startups are simply not small versions of large companies! Startups are actually temporary organizations designed to search for a scalable and repeatable business model.

Join Now to Subscribe to this Podcast
  • Visit Website
  • RSS
  • Artist: Steve Blank
  • Copyright: Copyright 2010 by Albedrio Partners, Inc.

Podcasts:

 Intel Disrupted: Why large companies find it difficult to innovate, and what they can do about it | File Type: audio/mpeg | Duration: 00:08:10

In the 21st century it’s harder for large corporations to create disruptive breakthroughs. Disruptive innovations are coming from startups – Telsa for automobiles, Uber for taxis, Airbnb for hotel rentals, Netflix for video rentals and Facebook for media.

 Hacking for Defense @ Stanford – Lessons Learned Presentations | File Type: audio/mpeg | Duration: 00:10:16

We just held our tenth and final week of the Hacking for Defense class. Today the eight teams presented their Lessons Learned presentations. We’re a little stunned about how well the first prototype of this class went. Over half the student teams have decided to continue working on national security projects after this class. Other colleges and universities have raised their hand and said they want to offer this at their school.

 Hacking for Defense (H4D) @ Stanford – Weeks 8 and 9 | File Type: audio/mpeg | Duration: 00:13:34

We just held our eighth and ninth weeks of the Hacking for Defense class. Now with over 917 interviews of beneficiaries (users, program managers, stakeholders, etc.), the teams spent the last two weeks learning what activities, resources and partners they would need to actually deliver their solution. And they’re getting a handle on what it costs to build a company to deliver it.

 NYU Commencement Speech 2016 | File Type: audio/mpeg | Duration: 00:12:55

Thank you for the opportunity to address you on your graduation from this esteemed engineering school. I’m honored to help you celebrate this important milestone. Your life is already full of milestones: Your first steps, your first kiss, passing a driving test, this graduation. And there are more to come: your first job, getting married, buying a house, having a child, becoming a manager, starting a company, retirement – and eventually commencement speaker:-)

 Hacking for Defense @ Stanford – Week 7 | File Type: audio/mpeg | Duration: 00:13:43

We just held our seventh week of the Hacking for Defense class. Now with over 750 interviews of beneficiaries (users, program managers, stakeholders, etc.) almost all the teams are beginning to pivot from their original understanding of their sponsor’s problem and their hypotheses about how to solve them. Minimal viable products are being demo’d to sponsors and sponsors are reacting to what the teams are learning. This week teams figured out how to measure mission achievement and success, and our advanced lectures were on activities, resources and partners.

 Hacking for Defense @ Stanford – Week 6 | File Type: audio/mpeg | Duration: 00:12:11

We just held our sixth week of the Hacking for Defense class. Now with over 660 interviews of beneficiaries (users, program managers, stakeholders, etc.) the teams are getting deep into problem understanding and their minimal viable products are getting sophisticated enough to generate detailed customer feedback; we gave them advice on how to “stand and deliver” in class; and our advanced lecture explained how to find and measure mission achievement.

 Hacking for Defense @ Stanford – Week 5 | File Type: audio/mpeg | Duration: 00:12:07

We just held our fifth week of the Hacking for Defense class. This week the teams passed the half way mark in the class. They’ve collectively talked to over 550 beneficiaries (users, program managers, stakeholders, etc.) Their focus for this week was to figure out how to get products rapidly deployed into their sponsors organization. Our advanced lecture explained how to get buy-in for your solution by creating an insurgency among your supporters and advocates.

 Hacking for Defense @ Stanford – Week 4 | File Type: audio/mpeg | Duration: 00:11:58

We just held our fourth week of the Hacking for Defense class. This week the teams turned the corner on understanding beneficiaries and finding product/market fit. The 8 teams spoke to 115 beneficiaries (users, program managers, etc.); we sent each team a critique of their mission model canvas; we started streaming the class live to DOD/IC sponsors and other educators; our advanced lecture explained how to go from concept to deployment in the DOD/IC; and we watched as the students got closer to understanding the actual problems their customers have.

 Hacking for Defense (H4D) @ Stanford – Week 3 | File Type: audio/mpeg | Duration: 00:13:07

We just held our third week of the Hacking for Defense class. This week the 8 teams spoke to 108 beneficiaries (users, program mangers, etc.), we held a Customer Discovery workshop, we started streaming the class live to DOD/IC sponsors and other educators, our advanced lecture was on Product/Market fit for the DOD/IC and we watched as the students solved their customer discovery obstacles and started getting closer to their customers.

 Hacking for Defense (H4D) @ Stanford – Week 2 | File Type: audio/mpeg | Duration: 00:11:49

We just held our second week of the Hacking for Defense class. This week the 8 teams spoke to 106 beneficiaries (users, program mangers, etc.), we held a DOD/IC 101 workshop, our advanced lecture was on the Value Proposition Canvas, and we watched as the students ran into common customer discovery obstacles and found new ones.

 Hacking for Defense (H4D) @ Stanford – Week 1 | File Type: audio/mpeg | Duration: 00:09:07

Hacking for Defense is a new class in Stanford’s School Engineering, where students learn about the nation’s security challenges by working with innovators inside the Department of Defense (DoD) and Intelligence Community. The class teaches students the Lean Startup approach to entrepreneurship while they engage in what amounts to national public service.

 What Founders Need to Know: You Were Funded for a Liquidity Event – Start Looking | File Type: audio/mpeg | Duration: 00:14:48

To most founders a startup is not a job, but a calling. But startups require money upfront for product development and later to scale. Traditional lenders (banks) think that startups are too risky for a traditional bank loan

 Learning Through Reflection | File Type: audio/mpeg | Duration: 00:09:01

We just finished the 6th annual Lean LaunchPad class. This year we made a small but substantive addition to way we teach the class, adding a week for reflection. The results have made the class massively better.

 The Mission Model Canvas – An Adapted Business Model Canvas for Mission-Driven Organizations | File Type: audio/mpeg | Duration: 00:10:29

As we prepared for the new Hacking for Defense class at Stanford, we had to stop and ask ourselves: How do we use the Business Model Canvas if the primary goal is not to earn money, but to fulfill a mission? In other words, how can we adapt the Business Model Canvas when the metrics of success for an organization is not revenue?

 Hacking for Defense @ Stanford – Making the World a Safer Place | File Type: audio/mpeg | Duration: 00:12:04

Introducing Hacking for Defense – Connecting Silicon Valley Innovation Culture and Mindset to the Department of Defense and the Intelligence Community Hacking for Defense is a new course at Stanford’s Engineering School in the Spring of 2016. It is being taught by Tom Byers, Steve Blank, Joe Felter and Pete Newell and is advised by former Secretary of Defense Bill Perry. Join a select cross-disciplinary class that will put you hands-on with the masters of lean innovation to help bring rapid-fire innovative solutions to address threats to our national security. Why?

Comments

Login or signup comment.