Autonomous Security

with No Comments

“This is what I was told. Hey Bill you’re out of your mind! This will never work. You’ll need 15 million dollars to build the first prototype and it won’t work. It’s hardware and software, too complicated. You should pick one. And lastly, physical security is not an investment thesis, you need to go away”

Finding your Synthetic Voice …

with No Comments

The emergence of AI is powering a new approach to analyzing voices, identifying and tagging speaking patterns by age, gender, education, cultural heritage, and accent. This podcast discusses the Company’s technology to create a synthesized voice that is designed to fit the character in a movie, animation or audio dialogue.

The Cheating Iceberg

with No Comments

The cheating scandal in university admissions may well be just the tip of the iceberg.  Test cheating itself has become pervasive in the growth of credentialed certifications, in areas such as computer network engineering, vendor-specific network, and data communications protocols.

Connecting the “aha mo …

with No Comments

Barbara, the entrepreneur met Alicia, the investor, during the first phase of a company review and qualification process. The first conversation initiated an understanding of the Ponga product, the problem being solved, the market, team, traction, all good stuff. There was great chemistry in those meetings. Barbara provides personal insights … Read More

Burned by the Breach

with No Comments

    Equifax delivers the 3:00 am burn notice to consumers and corporations.  Two renown Silicon Valley venture investors, Ken Elefant of Sorenson Ventures and TJ Rylander of Next47 discuss the depth of the Equifax Data Breach, cybersecurity issues, best practices and safeguards for all corporations.   Background On September 7, … Read More