Autonomous Security

with No Comments

“This is what I was told. Hey Bill you’re out of your mind! This will never work. You’ll need 15 million dollars to build the first prototype and it won’t work. It’s hardware and software, too complicated. You should pick one. And lastly, physical security is not an investment thesis, you need to go away”
Read More

Finding your Synthetic Voice …

with No Comments

The emergence of AI is powering a new approach to analyzing voices, identifying and tagging speaking patterns by age, gender, education, cultural heritage, and accent. This podcast discusses the Company’s technology to create a synthesized voice that is designed to fit the character in a movie, animation or audio dialogue.… Read More

The Cheating Iceberg

with No Comments

The cheating scandal in university admissions may well be just the tip of the iceberg.  Test cheating itself has become pervasive in the growth of credentialed certifications, in areas such as computer network engineering, vendor-specific network, and data communications protocols.… Read More

Connecting the “aha mo …

with No Comments

Barbara, the entrepreneur met Alicia, the investor, during the first phase of a company review and qualification process. The first conversation initiated an understanding of the Ponga product, the problem being solved, the market, team, traction, all good stuff. There was great chemistry in those meetings. Barbara provides personal insights … Read More