Hacker Newsnew | past | comments | ask | show | jobs | submit | stenlix's commentslogin

Curious if you explored any external tools before building in-house? Looking to do something similar at my company


Don't have access to the full article so I've only read the abstract, but what's the feasibility of deployment here?



Hey Feross, took this class in the fall and loved it! Highly recommended for anyone who wants to get the lay of the land in web security.


Curious how you got the search to work in the fb ad library. My queries seem to just hang there?


Do you have an adblocker enabled? If so, that may be the issue here.


Type in the company name and then wait for the drop-down to come.


Highly recommend the book, "An American Sickness," for reading about tactics like the one described in the article that Big Pharma and other players (e.g. insurers) in the healthcare ecosystem use to extract money out of said ecosystem.


Just wondering, in what ways are you different from Front (I’m not too familiar with the space)?


Missive is a central hub for all your team communications, both internal (chat) and external (emails, Twitter, Fb, SMS). We offer an email client like interface (thread based).

The key difference is we offer internal chat (no tied to external conversations) and the UI is more akin to your email client. You consume everything from an Inbox.

Missive really feels like a snappy email client, a lot of our paying users even use it alone (not in a team context) just because they like the UI. (https://www.youtube.com/watch?v=j95F4sr5Qdw)


A big theme in the class was the importance of understanding the real experiences of potential beneficiaries. The specific team in the picture wanted to understand what it was like to be in SEAL training since their project specifically dealt with that problem area.


I'd like to politely disagree. I took the Hacking for Defense class at my school and had a completely different experience from the one you worry about. I think the most important misunderstanding to clear up is that the hacking in the class is not about hacking in the NSA/cybersecurity sense but rather the process of building something. Just like at a hackathon, students aren't all trying to hack the school's wifi etc., this class is about using a different approach to tackling military problems.

I've attached a link to our class website which contains a superset of the problems that my classmates and I tackled throughout the quarter. Hopefully you'll find it informative.

Class website: http://hacking4defense.stanford.edu/


> this class is about using a different approach to tackling military problems.

The real problem is the amount of money and human life that are squandered on perceived "military problems" in the US. There are plenty of other hackathons to go to, IMO attending these events and accepting their material support is legitimizing US Department of Defense sponsored terrorism.


Those are my classmates! I took the Hacking for Defense class with them this past Spring at Stanford. I found that fundamentally the class trains students to apply the iterative, quick-moving, need-based approach to product development often found in startups to military problems that have traditionally had lots of bureaucratic overhead. We were exposed to a ton of different people through our interviews and were constantly asked to create and improve our minimum viable product as we learned more about our problem space. Overall, I would highly recommend the class.


Seems like as of 2015 he has one!

source: https://twitter.com/paulg/status/575490964527034368


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: