Highly recommend the book, "An American Sickness," for reading about tactics like the one described in the article that Big Pharma and other players (e.g. insurers) in the healthcare ecosystem use to extract money out of said ecosystem.
Missive is a central hub for all your team communications, both internal (chat) and external (emails, Twitter, Fb, SMS). We offer an email client like interface (thread based).
The key difference is we offer internal chat (no tied to external conversations) and the UI is more akin to your email client. You consume everything from an Inbox.
Missive really feels like a snappy email client, a lot of our paying users even use it alone (not in a team context) just because they like the UI. (https://www.youtube.com/watch?v=j95F4sr5Qdw)
A big theme in the class was the importance of understanding the real experiences of potential beneficiaries. The specific team in the picture wanted to understand what it was like to be in SEAL training since their project specifically dealt with that problem area.
I'd like to politely disagree. I took the Hacking for Defense class at my school and had a completely different experience from the one you worry about. I think the most important misunderstanding to clear up is that the hacking in the class is not about hacking in the NSA/cybersecurity sense but rather the process of building something. Just like at a hackathon, students aren't all trying to hack the school's wifi etc., this class is about using a different approach to tackling military problems.
I've attached a link to our class website which contains a superset of the problems that my classmates and I tackled throughout the quarter. Hopefully you'll find it informative.
> this class is about using a different approach to tackling military problems.
The real problem is the amount of money and human life that are squandered on perceived "military problems" in the US. There are plenty of other hackathons to go to, IMO attending these events and accepting their material support is legitimizing US Department of Defense sponsored terrorism.
Those are my classmates! I took the Hacking for Defense class with them this past Spring at Stanford. I found that fundamentally the class trains students to apply the iterative, quick-moving, need-based approach to product development often found in startups to military problems that have traditionally had lots of bureaucratic overhead. We were exposed to a ton of different people through our interviews and were constantly asked to create and improve our minimum viable product as we learned more about our problem space. Overall, I would highly recommend the class.