article thumbnail

Technology, Innovation, and Great Power Competition – Class 8 – Cyber

Steve Blank

Class 2 focused on China, the U.S.’s China is using all elements of its national power, e.g. information/ intelligence, its military might and economic strength as well as exploiting Western finance and technology. China’s goal is to challenge and overturn the U.S.-led IP & Protected Personal Information Theft.

article thumbnail

In a Strong Wind Even Turkeys Can Fly

Both Sides of the Table

Increasingly it became difficult to tell any system integration company apart and there was a whole new breed of competitors in the market helping companies build Internet businesses. Andersen had lost its long-time CEO, George Shaheen, was hemorrhaging staff and wasn’t exactly known as being an Internet pioneer.

Turkey 302
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

41% Of Attack Traffic Originates From China – Akamai

YoungUpstarts

According to data in the latest State of the Internet Report provided by Akamai Technologies , 56% of all malignant traffic observed by its customers – such as Distributed Denial of Service (DDoS) attacks – originate from the Asia Pacific/Oceania region, with China contributing a full 41%.

China 150
article thumbnail

Artificial Intelligence and Machine Learning– Explained

Steve Blank

Instead of building a model from scratch you can now buy , for common machine learning tasks, pretrained models from others and here , much like chip designers buying IP Cores.). IP (Intellectual Property) Vendors Also Offer AI Accelerators. Machine Learning Training – Hardware.

article thumbnail

Looking Back On Tech, Startups, And VC In 2018

Haystack

China’s growth over the past few decades has been remarkable. companies, more sensitivity around technology IP and security. Influenced by the rapid growth of the bike-sharing craze in China, a savvy Uber employee spun out to create Bird. And, this goes well beyond the current resident of 1600 Pennsylvania Avenue.

article thumbnail

Eastern European Champions & the 4 V’s of Big Data

Cracking the Code

The first category includes companies that have a dominant position in their national market and are often internet or ecommerce companies. The second category is composed of companies that have developed a unique IP locally and marketed it worldwide - typically in the gaming, software, security or mobile sectors. in GE, 1.3

article thumbnail

How to Scale a Venture Capital (or Private Equity) Fund

David Teten

This is a model used in at least one case by China’s third-largest private equity firm, China Science & Merchants Investment Management Group ($12 billion+ AUM), which funded in 2015 CSC Upshot, a $400m seed fund through AngelList. Prehype , Rocket Internet , and numerous others. For more, see the Startup Studio Playbook.